Results 1 - 10
of
38
Simple and Flexible Private Revocation Checking
, 2006
"... Digital certificates signed by trusted certification authorities (CAs) are used for multiple purposes, most commonly for secure binding of public keys to names and other attributes of their owners. Although a certificate usually includes an expiration time, it is not uncommon that a certificate n ..."
Abstract
- Add to MetaCart
needs to be revoked prematurely. For this reason, whenever a client (user or program) needs to assert the validity of another party's certificate, it performs revocation checking. There are many revocation techniques varying in both the operational model and underlying data structures. One
Simple and flexible revocation checking with privacy
- In Workshop on Privacy-Enhanced Technologies (PET’06
, 2006
"... Abstract. Digital certificates signed by trusted certification authorities (CAs) are used for multiple purposes, most commonly for secure binding of public keys to names and other attributes of their owners. Although a certificate usually includes an expiration time, it is not uncommon that a certif ..."
Abstract
-
Cited by 3 (1 self)
- Add to MetaCart
of privacy in revocation checking and its contribution is two-fold: it identifies and explores the loss of privacy inherent in current revocation checking, and, it constructs a simple, efficient and flexible privacy-preserving component for one well-known revocation method. 1
Simple and Flexible Privacy-Preserving Revocation Checking
, 2006
"... Digital certificates signed by trusted certification authorities (CAs) are used for multiple purposes, most commonly for secure binding of public keys to names and other attributes of their owners. Although a certificate usually includes an expiration time, it is not uncommon that a certificate need ..."
Abstract
- Add to MetaCart
of privacy in revocation checking and its contribution is two-fold: it identifies and explores the loss of privacy inherent in current revocation checking, and, it constructs a simple, efficient and flexible privacy-preserving component for one well-known revocation method. 1
KeySlinger and StarSlinger: Secure Key Exchange and Encrypted File Transfer
, 2011
"... necessarily representing the official policies or endorsements, either express or implied, of ARO, ..."
Abstract
- Add to MetaCart
necessarily representing the official policies or endorsements, either express or implied, of ARO,
Towards Secure Electronic Workflows Examples of Applied PKI Supervisor:
, 2006
"... Hiermit versichere ich, die vorliegende Diplomarbeit selbstständig und unter ausschliesslicher Verwendung der angegebenen Quellen und Hilfsmittel angefertigt zu haben. Diese Arbeit hat in gleicher oder ähnlicher Form noch keiner Prüfungsbehörde vorgelegen. Darmstadt, 14. Februar 2006 ..."
Abstract
- Add to MetaCart
Hiermit versichere ich, die vorliegende Diplomarbeit selbstständig und unter ausschliesslicher Verwendung der angegebenen Quellen und Hilfsmittel angefertigt zu haben. Diese Arbeit hat in gleicher oder ähnlicher Form noch keiner Prüfungsbehörde vorgelegen. Darmstadt, 14. Februar 2006
Author manuscript, published in "WWW (Companion Volume) (2012) 211-214" The ERC Webdam on Foundations of Web Data Management ∗
, 2012
"... The Webdam ERC grant is a five-year project that started in December 2008. The goal is to develop a formal model for Web data management that would open new horizons for the development of the Web in a well-principled way, enhancing its functionality, performance, and reliability. Specifically, the ..."
Abstract
- Add to MetaCart
, the goal is to develop a universally accepted formal framework for describing complex and flexible interacting Web applications featuring notably data exchange, sharing, integration, querying, and updating. We also propose to develop formal foundations that will enable peers to concurrently reason about
unknown title
"... ABSTRACT: Cloud computing is an arising technology which provide various services through internet. User can remotelystored their data on the cloud. And enjoying on demand high quality cloud applications without the burden of local storage and maintenance. But the user do not fell protected because ..."
Abstract
- Add to MetaCart
to extend the short signature scheme to give simple ring signatures Ensuring Data storage Security in cloud Computing(2009) To ensure the correctness of user's data in cloud data storage,a effective and flexible distributed scheme with explicit dynamic data support is proposed by C. Wang, Q. Wang, K
Stewardship and Public Service: A Discussion Paper Prepared for the Public Service
- Commission of Canada. James L. Armstrong and Associates. March
, 1997
"... Our discussion about stewardship and public service begins with a critique of market based reforms that have profoundly reshaped the public service world-wide during the past two decades. While it is maintained that these reforms were necessary and have resulted in many positive outcomes, the centr ..."
Abstract
-
Cited by 4 (0 self)
- Add to MetaCart
trends take us in a direction so far away from selflessly safeguarding public interest that the idea has become untenable, or outdated? • The public service must be flexible and at the same time provide long-term stability. This requires continuously learning and adapting, which indicates that more needs
doi:10.1155/2012/923594 Research Article Analysis of Mobility and Sharing of WSNs By IP Applications
"... License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited. Movement of wireless sensor and actuator networks, and of nodes between WSANs are becoming more commonplace. However, enabling remote usage of sensory data in multiple ..."
Abstract
- Add to MetaCart
License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited. Movement of wireless sensor and actuator networks, and of nodes between WSANs are becoming more commonplace. However, enabling remote usage of sensory data in multiple applications, remote configuration, and actuation is still a big challenge. The purpose of this paper is to analyse and describe which mobility support can best be used in different scenarios, and how shared usage of mobile WSANs by multiple IP applications can best be scaled up. This paper describes logistic and person monitoring scenarios, where different types of movements take place. These mobility types and their implications are categorized and analysed. Different degrees of support for these mobility types are analysed in the context of the mobility scenarios. Additionally, different schemes are analysed for shared use of mobile WSANs by multiple applications. In conclusion, guidelines are provided for dealing with mobile and overlapping WSANs and the most promising scheme for shared use of mobile WSANs by IP applications. 1.
Results 1 - 10
of
38