Zobrazeno 1 - 7
of 7
pro vyhledávání: '"Stefano Crosta"'
Publikováno v:
Electronic Notes in Theoretical Computer Science. 171:107-120
A policy-based encryption scheme allows to encrypt a message according to a credential-based policy formalized as monotone Boolean expression written in standard normal form. The encryption is so that only the users having access to a qualified set o
Autor:
Thierry Coupaye, Kevin Y. Ung, Mauricio Marin, Radu Calinescu, Lourdes Peñalver Herrero, Armando Ferro, Athanasios V. Vasilakos, Mikael Salaun, Fidel Liberal, Stefano Crosta, Petre Dini, Jaime Lloret Mauri, Carlos Turro, Masayuki Murata
Publikováno v:
2009 Fifth International Conference on Autonomic and Autonomous Systems.
Publikováno v:
ISSE 2006 — Securing Electronic Busines Processes ISBN: 9783834802132
ISSE
ISSE
Businesses, government agencies, and educational institutions all share information electronically. While digital signature based on public key infrastructure is commonly accepted as the natural answer to secure data exchange, the actual digital sign
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::20d6df6d0e68fef193e0b38bcbbdaa63
https://doi.org/10.1007/978-3-8348-9195-2_26
https://doi.org/10.1007/978-3-8348-9195-2_26
Publikováno v:
AsiaCCS
The concept of policy-based cryptography is a promising paradigm for trust establishment and authorization in largescale open environments like the Internet and Mobile Networks. It aims at providing a framework for performing cryptographic operations
Publikováno v:
Lecture Notes in Computer Science ISBN: 9783540380801
SCN
SCN
The term proxy certificate is used to describe a certificate that is issued by an end user for the purpose of delegating responsibility to another user so that the latter can perform certain actions on behalf of the former. Such certificates have bee
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::9b95edf7c019744d9f87e7af69d53738
https://doi.org/10.1007/11832072_22
https://doi.org/10.1007/11832072_22
Publikováno v:
ISSE 2005 — Securing Electronic Business Processes ISBN: 9783834800114
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::f2f910b796c246ddf189ac1ae00be131
https://doi.org/10.1007/978-3-322-85237-3_43
https://doi.org/10.1007/978-3-322-85237-3_43
Publikováno v:
Lecture Notes in Computer Science ISBN: 9783540201762
ISC
ISC
Many pervasive and ubiquitous application scenarios consider the interaction of users with surrounding devices offering services anywhere and anytime as one of the main future challenges. However, before this vision becomes reality, many security iss
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::3d4e1658a393358f03291e79a5a57d84
https://doi.org/10.1007/10958513_23
https://doi.org/10.1007/10958513_23