Cargando…

Public Key Infrastructure Second European PKI Workshop: Research and Applications, EuroPKI 2005, Canterbury, UK, June 30- July 1, 2005, Revised Selected Papers /

This book contains the proceedings of the 2nd EuroPKI Workshop - EuroPKI 2005, held at the University of Kent in the city of Canterbury, UK, 30 June-1 July 2005. The workshop was informal and lively, and the university setting encouragedactive exchangesbetween the speakersand the audience. Theworksh...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor Corporativo: SpringerLink (Online service)
Otros Autores: Chadwick, David (Editor ), Zhao, Gansen (Editor )
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Berlin, Heidelberg : Springer Berlin Heidelberg : Imprint: Springer, 2005.
Edición:1st ed. 2005.
Colección:Security and Cryptology ; 3545
Temas:
Acceso en línea:Texto Completo
Tabla de Contenidos:
  • Authorisation
  • A Multipurpose Delegation Proxy for WWW Credentials
  • Secure Role Activation and Authorization in the Enterprise Environment
  • Towards a Unified Authentication and Authorization Infrastructure for Grid Services: Implementing an Enhanced OCSP Service Provider into GT4
  • Interoperability
  • A Heterogeneous Network Access Service Based on PERMIS and SAML
  • Interoperation Between a Conventional PKI and an ID-Based Infrastructure
  • XKMS Working Group Interoperability Status Report
  • Evaluating a CA
  • An Innovative Policy-Based Cross Certification Methodology for Public Key Infrastructures
  • Modeling Public Key Infrastructures in the Real World
  • Classifying Public Key Certificates
  • ID Based Ring Signatures
  • Identity Based Ring Signature: Why, How and What Next
  • Practical Implementations
  • Development of a Flexible PERMIS Authorisation Module for Shibboleth and Apache Server
  • CA-in-a-Box
  • New Protocols
  • A Lower-Bound of Complexity for RSA-Based Password-Authenticated Key Exchange
  • Recoverable and Untraceable E-Cash
  • Risks and Attacks
  • A Method for Detecting the Exposure of OCSP Responder's Session Private Key in D-OCSP-KIS
  • Installing Fake Root Keys in a PC
  • Long Term Archiving
  • Provision of Long-Term Archiving Service for Digitally Signed Documents Using an Archive Interaction Protocol
  • Legal Security for Transformations of Signed Documents: Fundamental Concepts.