نتایج جستجو برای: پیاده سازی زیر ساخت امنیتی کلید عمومی pki و pki e

تعداد نتایج: 1775914  

2001
Boaz Gelbord Gert Roelofsen

In this short paper we introduce a technique for a more private form of biometric identification to be used in PKI applications. We discuss how this technique can be applied within Internet banking. In particular we see the opportunity to apply these techniques in some of the developing PKI markets in Asia, where the legacy PKI systems will not form a barrier to entry. Biometric techniques have...

Journal: :Softw., Pract. Exper. 2005
Marty Humphrey Jim Basney Jim Jokl

As Grid deployments increase, the challenge remains to create a scalable, multi-organizational authentication infrastructure. Public key infrastructures (PKIs) are widely used for authentication in Grids, due in large part to the success of the Globus toolkit, despite the challenges and difficulties both for PKI administrators and users. The Bridge Certificate Authority (CA) is a compromise bet...

2004
Jim Jokl Jim Basney Marty Humphrey

Public-Key Infrastructures (PKIs) are widely used for authentication in Grids, due in large part to the success of the Globus toolkit, despite the challenges and difficulties both for PKI administrators and users. The Bridge Certificate Authority (CA) is a compromise between a strictly hierarchical PKI and a mesh PKI and achieves many of the benefits of the hierarchical PKI and mesh PKI but has...

2004
A. Jancic Matthew J. Warren

Electronic communications have become the most important kind of communications in business. However, trust, privacy and security have become the great challenges for business and governments around the globe. The Public Key Infrastructure (PKI) model tries to solve these issues and make the Internet more secure. This paper explains the main purposes of PKI and addresses some of the major issue...

2013
Ashmeet Kaur

Database security concerns the use of a broad range of information security controls to protect databases potentially including the data, the database applications or stored functions, the database systems, the database servers and the associated network links against compromises of their confidentiality, integrity and availability. It involves various types or categories of controls, such as t...

Journal: :International Journal of Computer Applications 2014

Journal: :International Journal of Grid and High Performance Computing 2009

2013
Sebastian Wiesner

In this paper we discuss the SPKI standard as an alternative to the current X.509 and OpenPGP standards. The paper starts with a short history of PKI, and assesses the current state and the various flaws in the X.509 and OpenPGP standards. Then the main part of this paper explains the concepts of SPKI, and discusses how SPKI supports various notions of trust. Finally the paper concludes with an...

2000
Albert Levi M. Ufuk Çaglayan

Nested certification is a methodology for efficient certificate path verification. Nested certificates can be used together with classical certificates in the Public Key Infrastructures (PKIs). Such a PKI, which is called Nested certificate based PKI (NPKI), is proposed in this paper as alternative to classical PKI. The NPKI formation model is a transition from an existing PKI by issuing nested...

Journal: : 2023

در مقاله پس از معرّفی مختصر همایندها و اشاره به اهمیت این نوع ترکیب‌های ثابت آموزش زبان‌های خارجی، پیشینۀ بررسی آنها روسی فارسی پرداخته می‌شود. سپس دسته‌بندی‌های مطرح شده دسته‌بندی که آن برپایۀ واژۀ اصلی دیدگاه نحوی دو گروه الف) همایندهای فعلی ب) نامی (وصفی اضافی) تقسیم می‌شوند، مناسب برای خارجی دانسته است. پرسش پژوهش است میزان همگونی فارسیِ هم‌معنا تا چه اندازه بوده ضرورت گنجاندن مبحث زبان دانشج...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید