Simple public key infrastructure

Results: 43



#Item
11Web of trust / X.509 / Public key fingerprint / Trusted third party / Key authentication / Simple public key infrastructure / Key server / Public key certificate / Certificate authority / Cryptography / Key management / Public-key cryptography

1st Annual PKI Research Workshop---Proceedings Public-key Support for Collaborative Groups Steve Dohrmann, Carl Ellison ,

Add to Reading List

Source URL: www.cs.dartmouth.edu

Language: English - Date: 2002-08-03 22:47:04
12Simple public key infrastructure / Access control / Logic in computer science / Programming language semantics / Access Control Matrix / Kernel / Architecture of Windows NT / Operational semantics / Logical access control / Security / Computer security / Key management

Reconstructing Trust Management Ajay Chander ∗ Drew Dean † John C. Mitchell∗

Add to Reading List

Source URL: theory.stanford.edu

Language: English - Date: 2003-02-04 00:01:29
13Access control / Key management / Simple public key infrastructure / Authentication / PERMIS / Authorization / Credential / Lightweight Directory Access Protocol / Trust management / Security / Identity management / Computer security

A research and education initiative at the MIT Sloan School of Management Delegation Logic: A Logic-based Approach to Distributed Authorization Paper 115

Add to Reading List

Source URL: ebusiness.mit.edu

Language: English - Date: 2012-11-08 09:59:25
14Credential / Access control / PERMIS / Computer security / Identity management / Security / Simple public key infrastructure

Distributed Credential Chain Discovery in Trust Management ∗ William H. Winsborough Network Associates Laboratories

Add to Reading List

Source URL: theory.stanford.edu

Language: English - Date: 2002-09-12 20:01:20
15Simple public key infrastructure / Public key infrastructure / Authorization certificate / X.509 / Public key certificate / Pretty Good Privacy / S/MIME / P3P / Information security / Cryptography / Public-key cryptography / Key management

1 December 2002 e-Consent Implementation Considerations Page ii 1 December 2002 e-Consent Implementation Considerations Page ii

Add to Reading List

Source URL: www.xamax.com.au

Language: English - Date: 2013-03-21 21:40:26
16Data / Information / Public key certificate / X.509 / Simple public key infrastructure / Hash table / Certificate authority / Domain Name System / Lookup table / Key management / Public-key cryptography / Computing

ConChord: Cooperative SDSI Certificate Storage and Name Resolution Sameer Ajmani, Dwaine E. Clarke, Chuang-Hue Moh, and Steven Richman? MIT Laboratory for Computer Science 200 Technology Square, Cambridge, MA 02139, USA

Add to Reading List

Source URL: pmg.csail.mit.edu

Language: English - Date: 2002-08-29 21:29:57
17Barbara Jane Liskov / MIT Computer Science and Artificial Intelligence Laboratory / Simple public key infrastructure / Neural network / Cisco Systems / Computer security / Software / Computing / Security / Women in technology

Sameer Ajmani MIT Computer Science and AI Laboratory 200 Technology Square, Room 526 Cambridge, MA 02139, USA +[removed]removed]

Add to Reading List

Source URL: pmg.csail.mit.edu

Language: English - Date: 2004-04-11 00:06:13
18PlanetLab / Chord / Simple public key infrastructure / Computing / Distributed data storage / Peer-to-peer / Distributed computing

Sameer Ajmani Statement of Research Interests January 5, 2004 I am interested in improving the robustness and security of distributed systems, especially by creating better programming models and runtime environments for

Add to Reading List

Source URL: pmg.csail.mit.edu

Language: English - Date: 2004-01-05 16:56:24
19Applied mathematics / Simple public key infrastructure / Public key certificate / Authorization certificate / NP / Mathematical proof / Algorithm / Key management / Mathematical logic / Mathematics

How to Resolve SDSI Names Without Closure Sameer Ajmani MIT Computer Science and AI Lab 200 Technology Square, Cambridge, MA 02139, USA [removed] First Draft: June 6, 2002

Add to Reading List

Source URL: pmg.csail.mit.edu

Language: English - Date: 2004-02-28 18:57:41
20Cyberwarfare / Public key infrastructure / Gangster / Two-port network / Access control / PERMIS / Key management / Security / Simple public key infrastructure

Distributed Policy Specification and Interpretation with Classified Advertisements Nicholas Coleman West Virginia University Institute of Technology 405 Fayette Pike, Montgomery, WV[removed]removed]

Add to Reading List

Source URL: research.cs.wisc.edu

Language: English - Date: 2012-07-07 06:48:23
UPDATE