X.509

Results: 1596



#Item
791Digital signature / X.509 / Certificate server / Cryptosystem / Key server / Key / Public key infrastructure / Key authentication / Cryptography / Key management / Public-key cryptography

PKI - Sham or Salvation? Chair - Jon David Lehman Brothers Panelists Padgett Peterson Lockheed-Martin Tim Polk

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2000-11-03 00:00:00
792Public-key cryptography / Electronic commerce / Secure communication / Access control / X.509 / Public key certificate / HTTP Secure / X.500 / Transport Layer Security / Cryptography / Security / Cryptographic protocols

Smart Certi cates: Extending X.509 for Secure Attribute Services on the Web Joon S. Park and Ravi Sandhu The Laboratory for Information Security Technology Information and Software Engineering Department George Mason Uni

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 1999-11-05 00:00:00
793Cryptographic protocols / Internet protocols / Internet standards / Domain Name System Security Extensions / Public key certificate / X.509 / HTTP Secure / Cryptography / Public-key cryptography / Key management

Why Provable Transparency is Useful Against Surveillance Ben Laurie, Google (benl@google,com), 11 Jan 2014. Background Certificate Transparency (RFC 6962) is an example of a general mechanism which perm

Add to Reading List

Source URL: www.w3.org

Language: English - Date: 2014-02-07 14:41:45
794Data security / Certificate policy / Cyberwarfare / Business / Information security / Records management / X.509 / Public key certificate / Audit trail / Key management / Public-key cryptography / Security

GENERAL RECORDS SCHEDULE 3.2: Information Systems Security Records This schedule covers records created and maintained by Federal agencies related to protecting the security of information technology systems and data,

Add to Reading List

Source URL: archives.gov

Language: English - Date: 2014-09-29 15:32:22
795Fortezza / PKCS11 / PKCS / Public key infrastructure / Security token / X.509 / S/MIME / Software / Netscape / Cryptography

MAKING NETSCAPE COMPATIBLE WITH FORTEZZA® – LESSONS LEARNED George Ryan [removed] Pulse Engineering, Inc.

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 1999-11-05 00:00:00
796Electronic commerce / Cryptographic protocols / Computer network security / Entrust / Public key infrastructure / X.509 / Verisign / Digital signature / Cryptography / Public-key cryptography / Key management

PKI – The Gap Between Products and Standards Panel Proposal Panel Chair: Santosh Chokani, CygnaCom Solutions Panelists: Sharon Boeyen, Entrust Patrick Cain, BBN Technologies

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 1999-11-05 00:00:00
797Data security / Certificate policy / Cyberwarfare / Business / Records management / Information security / X.509 / Public key certificate / Public key infrastructure / Key management / Public-key cryptography / Security

Transmittal No. 23 September 2014 General Records Schedule 3.2 GENERAL RECORDS SCHEDULE 3.2: Information Systems Security Records

Add to Reading List

Source URL: archives.gov

Language: English - Date: 2014-09-16 09:18:40
798Revocation list / Certificate policy / X.509 / Public key infrastructure / Public key certificate / Certificate authority / Root certificate / X.500 / Certificate server / Cryptography / Public-key cryptography / Key management

PAPER RETHINKING DEPARTMENT OF DEFENSE PUBLIC KEY INFRASTRUCTURE Abstract This paper identifies and examines problems with implementing a Public Key Infrastructure (PKI) in the Department of Defense (DOD). Some of these

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2000-11-03 00:00:00
799Computer security / Aglets / Mobile agent / PERMIS / X.509 / Software agent / Public key certificate / Authorization certificate / Privilege Management Infrastructure / Cryptography / Public-key cryptography / Key management

Privilege Management of Mobile Agents Wayne Jansen, Tom Karygiannis National Institute of Standards and Technology Abstract: Most mobile agent systems use internal data structures within an agent to control and specify i

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2000-11-03 00:00:00
800Revocation list / Public key certificate / X.509 / Root certificate / Certificate authority / Self-signed certificate / Transport Layer Security / Extended Validation Certificate / HTTP Secure / Cryptography / Public-key cryptography / Key management

Analysis of SSL Certificate Reissues and Revocations in the Wake of Heartbleed Liang Zhang David Choffnes

Add to Reading List

Source URL: www.umiacs.umd.edu

Language: English - Date: 2014-11-07 18:41:40
UPDATE