Delegated Path Validation and Delegated Path Discovery Protocol Requirements
نویسندگان
چکیده
Status of this Memo This memo provides information for the Internet community. It does not specify an Internet standard of any kind. Distribution of this memo is unlimited. Abstract This document specifies the requirements for Delegated Path Validation (DPV) and Delegated Path Discovery (DPD) for Public Key Certificates. It also specifies the requirements for DPV and DPD policy management.
منابع مشابه
The Electrochemical Assay of Acetaminophen in Paracetamol Tablet With the Help of Differential Pulse Voltammetry
A sensitive electroanalytical method for determination of acetaminophen (ACT) in paracetamol tablet has been developed and validated. Cyclic voltammetry (CV) was used to study the electrochemical behaviour of paracetamol, while differential pulse voltammetry (DPV) was used to determine ACT. Screen printed carbon electrode was used for the analysis. Determination of all parameters in paracetamol...
متن کاملOn the Security of O-PSI a Delegated Private Set Intersection on Outsourced Datasets (Extended Version)
In recent years, determining the common information privately and efficiently between two mutually mistrusting parties have become an important issue in social networks. Many Private set intersection (PSI) protocols have been introduced to address this issue. By applying these protocols, two parties can compute the intersection between their sets without disclosing any information about compone...
متن کاملDelegating RAM Computations
In the setting of cloud computing a user wishes to delegate its data, as well as computations over this data, to a cloud provider. Each computation may read and modify the data, and these modifications should persist between computations. Minding the computational resources of the cloud, delegated computations are modeled as RAM programs. In particular, the delegated computations’ running time ...
متن کاملExplicit Delegation Using Configurable Cookies
Password sharing is widely used as a means of delegating access, but it is open to abuse and relies heavily on trust in the person being delegated to. We present a protocol for delegating access to websites as a natural extension to the Pico protocol. Through this we explore the potential characteristics of delegation mechanisms and how they interact. We conclude that security for the delegator...
متن کاملGeneric Security Service Application Program Interface (GSS-API) Extension for Storing Delegated Credentials
This document defines a new function for the Generic Security Service Application Program Interface (GSS-API), which allows applications to store delegated (and other) credentials in the implicit GSS-API credential store. This is needed for GSS-API applications to use delegated credentials as they would use other credentials. Status of This Memo This document specifies an Internet standards tra...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- RFC
دوره 3379 شماره
صفحات -
تاریخ انتشار 2002