Certificate-based authorization policy in a pki environment

被引:122
|
作者
Thompson, Mary R. [1 ,2 ]
Essiari, Abdelilah [1 ,2 ]
Mudumbai, Srilekha [1 ,2 ]
机构
[1] Lawrence Berkeley Natl. Laboratory
[2] Lawrence Berkeley Natl. Laboratory, MS50B-2239, 1 Cyclotron Rd., Berkeley, CA 94720
关键词
D O I
10.1145/950191.950196
中图分类号
学科分类号
摘要
44
引用
收藏
相关论文
共 50 条
  • [31] Certificate-Based Authenticated Key Agreement Protocols
    Nabil, Mohamed
    Abouelseoud, Yasmine
    Elkobrosy, Galal
    Abdelrazek, Amr
    2013 INTERNATIONAL CONFERENCE ON COMPUTER APPLICATIONS TECHNOLOGY (ICCAT), 2013,
  • [32] Certificate-Based Generalized Ring Signcryption Scheme
    Zhou, Caixue
    Gao, Guangyong
    Cui, Zongmin
    Zhao, Zhiqiang
    INTERNATIONAL JOURNAL OF FOUNDATIONS OF COMPUTER SCIENCE, 2018, 29 (06) : 1063 - 1088
  • [33] Certificate-Based Encryption Scheme without Pairing
    Yao, Ji
    Li, Jiguo
    Zhang, Yichen
    KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2013, 7 (06): : 1480 - 1491
  • [34] Enhanced Certificate-Based Encryption from pairings
    Shao, Zuhua
    COMPUTERS & ELECTRICAL ENGINEERING, 2011, 37 (02) : 136 - 146
  • [35] The Korean certificate-based digital signature algorithm
    Lim, CH
    Lee, PJ
    COMPUTERS & ELECTRICAL ENGINEERING, 1999, 25 (04) : 249 - 265
  • [36] Efficient Certificate-Based Signature and Its Aggregation
    Ma, Xinxin
    Shao, Jun
    Zuo, Cong
    Meng, Ru
    INFORMATION SECURITY PRACTICE AND EXPERIENCE, ISPEC 2017, 2017, 10701 : 391 - 408
  • [37] Korean certificate-based digital signature algorithm
    Lima, Chae Hoon
    Lee, Pil Joong
    Computers and Electrical Engineering, 1999, 25 (04): : 249 - 265
  • [38] Leakage-resilient certificate-based encryption
    Yu, Qihong
    Li, Jiguo
    Zhang, Yichen
    SECURITY AND COMMUNICATION NETWORKS, 2015, 8 (18) : 3346 - 3355
  • [39] An authorisation certificate-based access control model
    Li W.
    He J.
    Zhu N.
    Jin S.
    Teng D.
    International Journal of Security and Networks, 2021, 16 (04) : 258 - 266
  • [40] On the security of status certificate-based encryption scheme
    Park, Je Hong
    Lee, Dong Hoon
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2007, E90A (01) : 303 - 304