Preserving Public Key Hierarchy

نویسنده

  • Geoffrey C. Grabow
چکیده

91.3 Separation of Hierarchies................................................... 1178 91.4 Walk-Through of Issuance of a Certificate Containing a CSDT............................................................ 1179 91.5 Recovery Walk-Through .................................................... 1180 91.6 Known Issues ...................................................................... 1180 91.7 Summary ............................................................................. 1181 Bibliography...................................................................................... 1181

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Memory Performance of Public-Key Cryptography Methods in Mobile Environments

As an increasing number of Internet hosts are wireless, handheld devices with small memory and strict CPU-latency constraints, the performance of cryptography methods has become critical for high transaction throughput. Elliptic Curve Cryptography (ECC) is emerging as an attractive public-key system for constrained environments, because of the small key sizes and computational efficiency, while...

متن کامل

Selecting Hospital\'s Key Performance Indicators, Using Analytic Hierarchy Process Technique

Introduction: hospitals performance indicators will help monitoring, evaluation and decision making and therefore must be selected and ranked accurately. The aim of present study is identifying and selecting key hospitals performance indicators. Materials and methods: This is a descriptive and mixed (quantitative-qualitative) study. literature review and expert panel has been done to identif...

متن کامل

An Efficient, Dynamic and Trust Preserving Public Key Infrastructure

Nested certification is a methodology for efficient certificate path verification. Nested certificates can be used together with classical certificates in the Public Key Infrastructures (PKIs). Such a PKI, which is called Nested certificate based PKI (NPKI), is proposed in this paper as alternative to classical PKI. The NPKI formation model is a transition from an existing PKI by issuing nested...

متن کامل

Privacy-Preserving Electrocardiogram Monitoring for Intelligent Arrhythmia Detection †

Long-term electrocardiogram (ECG) monitoring, as a representative application of cyber-physical systems, facilitates the early detection of arrhythmia. A considerable number of previous studies has explored monitoring techniques and the automated analysis of sensing data. However, ensuring patient privacy or confidentiality has not been a primary concern in ECG monitoring. First, we propose an ...

متن کامل

A Dynamic Key Generation Scheme for Access Control in a Hierarchy

In this paper, we propose a new dynamic cryptographic key generation scheme for access control in a hierarchy. Our method can achieve the following three goals. First, the storage space needed to store public information is smaller than that required in the previous work. Second, when a security class is added to the hierarchy, we assign a secret key and a public derivation key to the security ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2007