Sciweavers

674 search results - page 2 / 135
» Resource Bound Certification
Sort
View
COMPSEC
2004
104views more  COMPSEC 2004»
13 years 6 months ago
Formal support for certificate management policies
Traditionally, creation and revocation of certificates are governed by policies that are carried manually, off-line, by trusted agents. This approach to certificate management is ...
Victoria Ungureanu
FOSAD
2009
Springer
14 years 24 days ago
Resource Usage Analysis and Its Application to Resource Certification
Elvira Albert, Puri Arenas, Samir Genaim, Germ&aac...
NJC
2000
169views more  NJC 2000»
13 years 6 months ago
A Type System for Bounded Space and Functional In-Place Update
We show how linear typing can be used to obtain functional programs which modify heap-allocated data structures in place. We present this both as a "design pattern" for ...
Martin Hofmann
IADIS
2004
13 years 7 months ago
Preliminary Steps in Designing and Implementing a Privilege Verifier for PMI
We have designed and deployed a system that uses X.509 public-key certificates (PKC) and attribute certificates (AC) for access control. This includes an authorization service for...
Diana Berbecaru, Antonio Lioy
ACSAC
2001
IEEE
13 years 10 months ago
Determining Privileges of Mobile Agents
This paper describes a method for controlling the behavior of mobile agent-system entities through the allocation of privileges. Privileges refer to policy rules that govern the a...
Wayne A. Jansen