ACM SIGAda Ada Letters
Certificates for mobile code security
Proceedings of the 2002 ACM symposium on Applied computing
Certificate based PKI and B2B E-commerce: suitable match or not?
Sec '01 Proceedings of the 16th international conference on Information security: Trusted information: the new decade challenge
Reducing certificate revocation cost using NPKI
Sec '01 Proceedings of the 16th international conference on Information security: Trusted information: the new decade challenge
Taming access control security: extending capabilities using the views relationship
Software—Practice & Experience
Public Key Infrastructures — the Next Generation
BT Technology Journal
Applications of Trusted Review to Information Security
ACISP '01 Proceedings of the 6th Australasian Conference on Information Security and Privacy
A Global PMI for Electronic Content Distribution
SAC '00 Proceedings of the 7th Annual International Workshop on Selected Areas in Cryptography
QPKI: A QoS-Based Architecture for Public-Key Infrastructure (PKI)
INDOCRYPT '02 Proceedings of the Third International Conference on Cryptology: Progress in Cryptology
Trust Relationships in a Mobile Agent System
MA '01 Proceedings of the 5th International Conference on Mobile Agents
A New Design of Privilege Management Infrastructure for Organizations Using Outsourced PKI
ISC '02 Proceedings of the 5th International Conference on Information Security
The PERMIS X.509 role based privilege management infrastructure
Future Generation Computer Systems - Special section: Selected papers from the TERENA networking conference 2002
Mobile Networks and Applications - Security in mobile computing environments
Toward public-key infrastructure interoperability
Communications of the ACM - E-services: a cornucopia of digital offerings ushers in the next Net-based evolution
PERCOM '03 Proceedings of the First IEEE International Conference on Pervasive Computing and Communications
A novel approach to certificate revocation management
Das'01 Proceedings of the fifteenth annual working conference on Database and application security
Role-based authorization in decentralized health care environments
Proceedings of the 2003 ACM symposium on Applied computing
Use of nested certificates for efficient, dynamic, and trust preserving public key infrastructure
ACM Transactions on Information and System Security (TISSEC)
Facilitating secure ad hoc service discovery in public environments
Journal of Systems and Software - Special issue: Computer software & applications
Support of subscribers' certificates in a hybrid WLAN-3G environment
Computer Networks: The International Journal of Computer and Telecommunications Networking
On interdomain routing security and pretty secure BGP (psBGP)
ACM Transactions on Information and System Security (TISSEC)
A holistic anonymity framework for web services
Proceedings of the 1st international conference on PErvasive Technologies Related to Assistive Environments
A scalable authentication model based on public keys
Journal of Network and Computer Applications
Holistic Electronic & Mobile Government Platform Architecture
Proceedings of the 2008 conference on Knowledge-Based Software Engineering: Proceedings of the Eighth Joint Conference on Knowledge-Based Software Engineering
An innovative platform architecture for complex secure e/m-governmental services
International Journal of Electronic Security and Digital Forensics
Distributed component architectures security issues
Computer Standards & Interfaces
Assessment of advanced cryptographic antiviral techniques
International Journal of Electronic Security and Digital Forensics
A high-performance virtual storage system for Taiwan UniGrid
GPC'07 Proceedings of the 2nd international conference on Advances in grid and pervasive computing
Toward secure and private service discovery anywhere anytime
Frontiers of Computer Science in China
A mission-critical certification authority architecture for high reliability and response time
International Journal of Critical Computer-Based Systems
Managing social overlay networks in semantic open enterprise systems
Proceedings of the International Conference on Web Intelligence, Mining and Semantics
Distributing security-mediated PKI revisited
EuroPKI 2006 Proceedings of the Third European conference on Public Key Infrastructure: theory and Practice
Development of a grid infrastructure for functional genomics
LSGRID'04 Proceedings of the First international conference on Life Science Grid
SP 800-52. Guidelines for the Selection and Use of Transport Layer Security (TLS) Implementations
SP 800-52. Guidelines for the Selection and Use of Transport Layer Security (TLS) Implementations
EuroPKI'07 Proceedings of the 4th European conference on Public Key Infrastructure: theory and practice
Journal of Network and Systems Management
International Journal of Systems and Service-Oriented Engineering
Attacks on Confidentiality of Communications Between Stranger Organizations
International Journal of Knowledge-Based Organizations
Hi-index | 0.01 |
From the Publisher:This book is a tutorial on, and a guide to the deployment of, Public-Key Infrastructures. It covers a broad range of material related to PKIs, including certification, operational considerations and standardization efforts, as well as deployment issues and considerations. Emphasis is placed on explaining the interrelated fields within the topic area, to assist those who will be responsible for making deployment decisions and architecting a PKI within an organization.