نتایج جستجو برای: پیاده سازی زیر ساخت امنیتی کلید عمومی pki و pki e

تعداد نتایج: 1775914  

2005
Mike Just Danielle Rosmarin

We describe a number of technical, legal, policy and business issues related to the development and deployment of Canada’s PKI-based solution for authenticating individuals and businesses. We argue that tackling these issues is critical in order for Canada’s PKI-based solution to truly transform Canada’s e-government services delivery, and we offer insights into options that could resolve outst...

Journal: :Clinical cancer research : an official journal of the American Association for Cancer Research 2011
Robert Mallon Larry R Feldberg Judy Lucas Inder Chaudhary Christoph Dehnhardt Efren Delos Santos Zecheng Chen Osvaldo dos Santos Semiramis Ayral-Kaloustian Aranapakam Venkatesan Irwin Hollander

PURPOSE The aim of this study was to show preclinical efficacy and clinical development potential of PKI-587, a dual phosphoinositide 3-kinase (PI3K)/mTOR inhibitor. EXPERIMENTAL DESIGN In vitro class 1 PI3K enzyme and human tumor cell growth inhibition assays and in vivo five tumor xenograft models were used to show efficacy. RESULTS In vitro, PKI-587 potently inhibited class I PI3Ks (IC(5...

2003
Xunhua Wang

Password-enabled PKI facilitates the private key management by integrating easy-to-use passwords into PKI. In the first PKI research workshop, Sandhu et al. categorized password-enabled PKI schemes as virtual soft tokens and virtual smartcards [26]. Compared to the conventional PKI, password-enabled PKI introduces a security-critical server where large number of password-related credentials are...

2016
Ran Canetti Daniel Shahaf Margarita Vald

Message authentication and key exchange are two of the most basic tasks of cryptography. Solutions based on public-key infrastructure (PKI) are prevalent. Still, the state of the art in composable security analysis of PKI-based authentication and key exchange is somewhat unsatisfactory. Specifically, existing treatments either (a) make the unrealistic assumption that the PKI is accessible only ...

2006
Jin-Bum Hwang Hyung-Kyu Lee Jong Wook Han

Device authentication can reinforce the security of the home network services by ensuring that only specific authorized devices by specific authorized users can access the services. And it is also a mandatory technology for context-aware services in which users are not participant in the service flow. In this paper, we propose a device authentication and access control scheme based on two-layer...

2007
Michael Gaude

This article provides a contribution to innovation research in the field of electronic signatures, particularly to the future development of the aspects of diffusion throughout the IT-technology of the "Public Key Infrastructure" (PKI). In the modern Internet economy, PKI-technology is generally seen as the basis for obligatory authentication and safe communication. Nowadays, large scale enterp...

2000
Adam L. Young Moti Yung

The deployment of a “public-key infrastructure” (PKI) has recently started. Another recent concern in business and on the national level is the issue of escrowed encryption, key recovery, and emergency access to information (e.g., in the medical record area). Independent development of a PKI and an escrowed PKI (whenever required or desired) will pose a lot of constraints, duplication efforts a...

2003
Jon Callas

Public key infrastructures (PKIs) exist for a number of purposes. One purpose is achieving widespread deployment of secure communication; the PKI makes it easy for two parties to communicate securely. Another purpose is that of secure delivery to a recipient; the PKI makes sure that when Alice sends a message to Bob, it arrives to the very Bob for whom Alice intended it. This white paper descri...

2007
Alex Golod

PKI is comprised of many components: technical infrastructure, policies, procedures, and people. Initial registration of subscribers (users, organizations, hardware, or software) for a PKI service has many facets, pertaining to almost every one of the PKI components. There are many steps between the moment when subscribers apply for PKI certificates and the final state, when keys have been gene...

Journal: :RFC 2008
Masaki Shimaoka Nelson E. Hastings Rebecca Nielsen

Status of This Memo This memo provides information for the Internet community. It does not specify an Internet standard of any kind. Distribution of this memo is unlimited. Abstract The objective of this document is to establish a terminology framework and to suggest the operational requirements of Public Key Infrastructure (PKI) domain for interoperability of multi-domain Public Key Infrastruc...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید