نتایج جستجو برای: پیاده سازی زیر ساخت امنیتی کلید عمومی pki و pki e
تعداد نتایج: 1775914 فیلتر نتایج به سال:
In this short paper we introduce a technique for a more private form of biometric identification to be used in PKI applications. We discuss how this technique can be applied within Internet banking. In particular we see the opportunity to apply these techniques in some of the developing PKI markets in Asia, where the legacy PKI systems will not form a barrier to entry. Biometric techniques have...
As Grid deployments increase, the challenge remains to create a scalable, multi-organizational authentication infrastructure. Public key infrastructures (PKIs) are widely used for authentication in Grids, due in large part to the success of the Globus toolkit, despite the challenges and difficulties both for PKI administrators and users. The Bridge Certificate Authority (CA) is a compromise bet...
Public-Key Infrastructures (PKIs) are widely used for authentication in Grids, due in large part to the success of the Globus toolkit, despite the challenges and difficulties both for PKI administrators and users. The Bridge Certificate Authority (CA) is a compromise between a strictly hierarchical PKI and a mesh PKI and achieves many of the benefits of the hierarchical PKI and mesh PKI but has...
Electronic communications have become the most important kind of communications in business. However, trust, privacy and security have become the great challenges for business and governments around the globe. The Public Key Infrastructure (PKI) model tries to solve these issues and make the Internet more secure. This paper explains the main purposes of PKI and addresses some of the major issue...
Database security concerns the use of a broad range of information security controls to protect databases potentially including the data, the database applications or stored functions, the database systems, the database servers and the associated network links against compromises of their confidentiality, integrity and availability. It involves various types or categories of controls, such as t...
In this paper we discuss the SPKI standard as an alternative to the current X.509 and OpenPGP standards. The paper starts with a short history of PKI, and assesses the current state and the various flaws in the X.509 and OpenPGP standards. Then the main part of this paper explains the concepts of SPKI, and discusses how SPKI supports various notions of trust. Finally the paper concludes with an...
Nested certification is a methodology for efficient certificate path verification. Nested certificates can be used together with classical certificates in the Public Key Infrastructures (PKIs). Such a PKI, which is called Nested certificate based PKI (NPKI), is proposed in this paper as alternative to classical PKI. The NPKI formation model is a transition from an existing PKI by issuing nested...
در مقاله پس از معرّفی مختصر همایندها و اشاره به اهمیت این نوع ترکیبهای ثابت آموزش زبانهای خارجی، پیشینۀ بررسی آنها روسی فارسی پرداخته میشود. سپس دستهبندیهای مطرح شده دستهبندی که آن برپایۀ واژۀ اصلی دیدگاه نحوی دو گروه الف) همایندهای فعلی ب) نامی (وصفی اضافی) تقسیم میشوند، مناسب برای خارجی دانسته است. پرسش پژوهش است میزان همگونی فارسیِ هممعنا تا چه اندازه بوده ضرورت گنجاندن مبحث زبان دانشج...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید