Sciweavers

10 search results - page 1 / 2
» europki 2005
Sort
View
EUROPKI
2005
Springer
13 years 10 months ago
Modeling Public Key Infrastructures in the Real World
John Marchesini, Sean W. Smith
EUROPKI
2005
Springer
13 years 10 months ago
Interoperation Between a Conventional PKI and an ID-Based Infrastructure
Abstract. In this paper we consider how practical interoperation between a conventional PKI and an infrastructure based on ID-based cryptography might be achieved. Major issues ari...
Geraint Price, Chris J. Mitchell
EUROPKI
2005
Springer
13 years 10 months ago
Installing Fake Root Keys in a PC
If a malicious party can insert a self-issued CA public key into the list of root public keys stored in a PC, then this party could potentially do considerable harm to that PC. In ...
Adil Alsaid, Chris J. Mitchell
EUROPKI
2005
Springer
13 years 10 months ago
Development of a Flexible PERMIS Authorisation Module for Shibboleth and Apache Server
This paper describes the development of a flexible Role Based Access Control (RBAC) authorisation module – the Shibboleth and Apache Authorisation Module (SAAM) which is based on...
Wensheng Xu, David W. Chadwick, Sassa Otenko
EUROPKI
2005
Springer
13 years 10 months ago
CA-in-a-Box
An enterprise (such as an institute of higher education) wishing to deploy PKI must choose between several options, all expensive and awkward. It might outsource certification to ...
Mark Franklin, Kevin Mitcham, Sean W. Smith, Joshu...