Sciweavers

48 search results - page 2 / 10
» Hierarchical Organization of Certification Authorities for S...
Sort
View
IASTEDSE
2004
13 years 8 months ago
An authorization and access control scheme for pervasive computing
The existence of a central security authority is too restrictive for pervasive computing environments. Existing distributed security schemes fail in a pervasive computing environm...
Linda Staffans, Titos Saridakis
COMPSAC
2003
IEEE
14 years 11 days ago
PeAgent - A Mobile Agent System to Support Secure Internet and Web Applications
Many agent-based systems have been developed over the past decade; however, the security issues are usually not addressed adequately. In order to make the mobile agent paradigm mo...
Qingkai Ma, Wei Hao, Wei Li, Manghui Tu, I-Ling Ye...
IEEEARES
2007
IEEE
14 years 1 months ago
Static evaluation of Certificate Policies for GRID PKIs interoperability
Validating an end-entity X.509 digital certificate prior to authorizing it for using a resource into the computational Grid has become a widely studied topic due to its importance...
Valentina Casola, Nicola Mazzocca, Jesus Luna, Osc...
HICSS
2005
IEEE
148views Biometrics» more  HICSS 2005»
14 years 21 days ago
Public-Key-Infrastructure Based on a Peer-to-Peer Network
The goal of a Public-Key-Infrastructure (PKI) is to prove whether a cryptographic public key is authentic for a certain user. This information is crucial for the reliability of as...
Thomas Wölfl
IJAMC
2008
84views more  IJAMC 2008»
13 years 7 months ago
Towards an authentication service for Peer-to-Peer based Massively Multiuser Virtual Environments
Abstract-- In this paper we propose a distributed authentication service for peer-to-peer (P2P) based massively multiuser virtual environments. Such a service is necessary to provi...
Arno Wacker, Gregor Schiele, Sebastian Schuster, T...