Zobrazeno 1 - 10
of 11
pro vyhledávání: '"John Iliadis"'
Publikováno v:
Information Management & Computer Security. 12:350-361
In order to provide customers with a sense of security regarding the protection of their personal data, companies sign on to a “seal” programme, where rules designed by the seal issuer in accordance to underlying laws must be adhered to. A user c
Publikováno v:
Computer Communications. 26:1851-1862
Several mechanisms have been proposed for disseminating information regarding the status of a digital certificate, each one with its own advantages and disadvantages. We believe that what is still missing from such mechanisms is transparency. A user
Autor:
D. De Cock, Bart Preneel, Dimitris Gritzalis, Diomidis Spinellis, John Iliadis, Stefanos Gritzalis
Publikováno v:
Computer Communications. 26:1839-1850
A wide spectrum of certificate revocation mechanisms is currently in use. A number of them have been proposed by standardisation bodies, while some others have originated from academic or private institutions. What is still missing is a systematic an
Publikováno v:
Medical Informatics and the Internet in Medicine. 26:49-72
In this paper we describe a pilot architecture aiming at protecting Web-based medical applications through the development of a virtual private medical network. The basic technology, which is utilized by this integrated architecture, is the Trusted T
Autor:
Sokratis K. Katsikas, Stefanos Gritzalis, Dimitris Gritzalis, John Iliadis, Diomidis Spinellis
Publikováno v:
Scopus-Elsevier
The EUROMED-ETS schema provides a robust security framework for telemedical applications operating over the World Wide Web. It is based on a trusted third party architecture under which certificate authorities store the public-key certificates of par
Autor:
Sokratis K. Katsikas, John Iliadis, Stefanos Gritzalis, Dimitris Gritzalis, Diomidis Spinellis
Publikováno v:
Medical Informatics and the Internet in Medicine. 24:75-90
The EUROMED-ETS pilot system offers a number of security functionalities using off-the-shelf available products, in order to protect Web-based medical applications. The basic concept used by the proposed security architecture is the Trusted Third Par
Publikováno v:
International Journal of Medical Informatics. 49:59-68
This paper reports on the results obtained by the pilot operation of Trusted Third Parties (TTP) for secure telemedical applications over the WWW. The work reported on herein was carried out within the context of EUROMED-ETS, a RD project funded by t
Autor:
John Iliadis, Stefanos Gritzalis
Publikováno v:
DEXA Workshop
The services offered to the Internet community have been constantly increasing in the last few years. This is mainly due to the fact that mobile code has matured enough to provide Internet users with high quality applications that can be executed rem
Autor:
Steven Xarhoulacos, Dimitris Gritzalis, Costas Lambrinoudakis, Kostantinos Moulinos, John Iliadis
Publikováno v:
IFIP Advances in Information and Communication Technology ISBN: 9780792373896
SEC
SEC
There is a scale between authentication and anonymity, which is currently leaning towards the side of authentication, when it comes to e-commerce. Service providers and merchants are usually keeping track of user-related information in order to const
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::e2519611390a78d132b2151ac79300a9
https://doi.org/10.1007/0-306-46998-7_1
https://doi.org/10.1007/0-306-46998-7_1
Publikováno v:
Computer Safety, Reliability and Security ISBN: 9783540651109
SAFECOMP
SAFECOMP
Java is a programming language that conforms to the concept of downloadable, executable content. Java offers a wide range of capabilities to the application programmer, the most important being that a program may be executed remotely, without any mod
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::956ed052e97d5a5a392f27334331e5ef
https://doi.org/10.1007/3-540-49646-7_9
https://doi.org/10.1007/3-540-49646-7_9