Results 1 - 10
of
32
Review and Revocation of Access Privileges Distributed with PKI Certificates
- IEEE Transactions on Software Engineering
, 2000
"... . Public-key infrastructures (PKIs) that support both identity certificates and access control (e.g., attribute, delegation) certificates are increasingly common. We argue that these PKIs must also support revocation and review policies that are typical of more traditional access control systems; ..."
Abstract
-
Cited by 17 (4 self)
- Add to MetaCart
The distribution and revocation of identity certificates in Public Key Infrastructures (PKIs) have been extensively addressed in the literature [7, 8, 12]. Various PKIs, such as X.509 [6, 10], SPKI [2], SDSI [11], and PKI applications [1,8], also include access control (i.e., attribute, delegation) certificates
Hybrid Inflation Models
, 2008
"... It has been shown that hybrid inflation may end with the formation of nontopological solitons of inflaton field. As a first step towards a fully realistic picture of the post-inflation era and reheating in supersymmetric hybrid inflation models, we study the classical scalar field equations of a sup ..."
Abstract
- Add to MetaCart
It has been shown that hybrid inflation may end with the formation of nontopological solitons of inflaton field. As a first step towards a fully realistic picture of the post-inflation era and reheating in supersymmetric hybrid inflation models, we study the classical scalar field equations of a
Post-Inflation Era in Supersymmetric Hybrid Inflation Models
, 2008
"... It has been shown that hybrid inflation may end with the formation of nontopological solitons of inflaton field. As a first step towards a fully realistic picture of the post-inflation era and reheating in supersymmetric hybrid inflation models, we study the classical scalar field equations of a sup ..."
Abstract
- Add to MetaCart
It has been shown that hybrid inflation may end with the formation of nontopological solitons of inflaton field. As a first step towards a fully realistic picture of the post-inflation era and reheating in supersymmetric hybrid inflation models, we study the classical scalar field equations of a
Stability Studies of Transition-Metal Linkage Isomers Using Quantum Mechanical Methods. Groups 11 and 12 Transition Metals
, 2005
"... Several hypotheses to elucidate the linkage isomer preference of the thiocyanate (SCN-) ion have been offered. For complexes with small coordination numbers (i.e., 1 and 2) and groups 11 (Cu-triad) and 12 (Zn-triad) metals, different levels of theory and a variety of basis sets have been employed to ..."
Abstract
- Add to MetaCart
to study linkage isomerism. Similar results are obtained for all density functionals tested, pure and hybrid. Overall, good agreement, vis-à-vis experimentally identified linkage isomers, is achieved for ab initio techniques, whereas semiempirical quantum mechanical methods show a bias toward S
Trust Models and Management in Public-Key Infrastructures
, 2000
"... This paper presents and compares several trust models currently being considered and applied for use with public-key certificate infrastructures based on the X.509 specification, including subordinated hierarchies, cross-certified meshes, hybrids, bridge CAs, and trust lists. Approaches and issues c ..."
Abstract
-
Cited by 10 (1 self)
- Add to MetaCart
This paper presents and compares several trust models currently being considered and applied for use with public-key certificate infrastructures based on the X.509 specification, including subordinated hierarchies, cross-certified meshes, hybrids, bridge CAs, and trust lists. Approaches and issues
GROWL Scripts: Lightweight Access to Grid Resources
"... There are currently many people moving from running jobs on clusters to running jobs on the Grid using a Globus command line interface. They typically don’t find this transition as simple as they should: they have problems building the software, have to learn about X509 certificate manipulation, and ..."
Abstract
-
Cited by 1 (0 self)
- Add to MetaCart
There are currently many people moving from running jobs on clusters to running jobs on the Grid using a Globus command line interface. They typically don’t find this transition as simple as they should: they have problems building the software, have to learn about X509 certificate manipulation
Towards Flexible Credential Verification in Mobile Ad-hoc Networks
- In: Proceedings of the ACM Workshop on Principles of Mobile Computing
, 2002
"... Ad-hoc networks facilitate interconnectivity between mobile devices without the support of a network infrastructure. In this paper we propose a flexible credential verification mechanism, which improves the likelihood that participants in an ad-hoc network can verify each other's credentials de ..."
Abstract
-
Cited by 9 (2 self)
- Add to MetaCart
despite the lack of access to certification and attribute authorities. Users maintain Credential Assertion Statements (CASs), which are formed through extraction of X.509 and attribute certificates into an interoperable XML form. Trusted entities that can verify the credentials listed in the CAS can
TITLE 13. CALIFORNIA AIR RESOURCES BOARD NOTICE OF PUBLIC HEARING TO CONSIDER PROPOSED MODIFICATIONS TO THE EXHAUST EMISSION STANDARDS AND TEST PROCEDURES- 1985 AND SUBSEQUENT MODEL YEAR HEAVY-DUTY URBAN BUS ENGINES AND VEHICLES, THE FLEET RULE FOR TRANSI
, 2004
"... The Air Resources Board (the Board or ARB) will conduct a public hearing at the time and place noted below to consider adoption of amendments to th,e urban bus engine exhaust emission standards, the fleet rule for transit agencies, and the zero emission bus requirements. The amendments would establi ..."
Abstract
- Add to MetaCart
establish a new standard for the certification of diesel hybrid-electric buses, require transit agencies purchasing these diesel hybrid-electric buses to offset the increased emissions,of oxides of nitrogen (NOx), and modify the zero emission bus demonstration project requirements. This notice summarizes
Mediating between Strangers: A Trust Management Based Approach
- In 2nd Annual PKI Research Workshop
, 2003
"... Data sources in i-mediation, following property-based security policies, aim at supporting a wide range of potential clients, which are in general unknown in advance and may belong to heterogeneous and autonomous security domains. This raises the challenge how remote and autonomous entities can ..."
Abstract
-
Cited by 1 (1 self)
- Add to MetaCart
agree on a common understanding of certified properties, and other issues related to these properties (e.g. encoding formats). This paper proposes solutions that are based on secure i-mediation and a hybrid PKI model, which unifies X.509 and SPKI. We present a mediation functionality, called f
Towards Secure Electronic Workflows Examples of Applied PKI Supervisor:
, 2006
"... Hiermit versichere ich, die vorliegende Diplomarbeit selbstständig und unter ausschliesslicher Verwendung der angegebenen Quellen und Hilfsmittel angefertigt zu haben. Diese Arbeit hat in gleicher oder ähnlicher Form noch keiner Prüfungsbehörde vorgelegen. Darmstadt, 14. Februar 2006 ..."
Abstract
- Add to MetaCart
Hiermit versichere ich, die vorliegende Diplomarbeit selbstständig und unter ausschliesslicher Verwendung der angegebenen Quellen und Hilfsmittel angefertigt zu haben. Diese Arbeit hat in gleicher oder ähnlicher Form noch keiner Prüfungsbehörde vorgelegen. Darmstadt, 14. Februar 2006
Results 1 - 10
of
32