Sciweavers

193 search results - page 7 / 39
» Secure Certification for ePortfolios
Sort
View
ACSAC
2001
IEEE
13 years 11 months ago
Determining Privileges of Mobile Agents
This paper describes a method for controlling the behavior of mobile agent-system entities through the allocation of privileges. Privileges refer to policy rules that govern the a...
Wayne A. Jansen
WWW
2005
ACM
14 years 8 months ago
Hardening Web browsers against man-in-the-middle and eavesdropping attacks
Existing Web browsers handle security errors in a manner that often confuses users. In particular, when a user visits a secure site whose certificate the browser cannot verify, th...
José Carlos Brustoloni, Xia Brustoloni
DBSEC
2003
113views Database» more  DBSEC 2003»
13 years 8 months ago
ECPV: Efficient Certificate Path Validation in Public-key Infrastructure
In the current public-key infrastructure (PKI) schemes based on X.509, a relying party must validate a user’s certificate as well as the existence of a path from its trust point...
Mahantesh Halappanavar, Ravi Mukkamala
AISM
2004
13 years 8 months ago
PKI - Advantages and Obstacles
Electronic communications have become the most important kind of communications in business. However, trust, privacy and security have become the great challenges for business and...
A. Jancic, Matthew J. Warren
FOSAD
2009
Springer
14 years 1 months ago
Resource Usage Analysis and Its Application to Resource Certification
Elvira Albert, Puri Arenas, Samir Genaim, Germ&aac...