Secure and flexible certificate access in WS-security through LDAP component matching
SWS '04 Proceedings of the 2004 workshop on Secure web service
Designing secure e-commerce with role-based access control
International Journal of Web Engineering and Technology
Identity-based Encryption: From Identity and Access Management to Enterprise Privacy Management
Information Systems Security
A scalable authentication model based on public keys
Journal of Network and Computer Applications
A structure-based clustering on LDAP directory information
ISMIS'08 Proceedings of the 17th international conference on Foundations of intelligent systems
Instant certificate revocation and publication using WebDAV
Journal of Computer Security - The 2007 European PKI Workshop: Theory and Practice (EuroPKI'07)
A Clustering-Driven LDAP Framework
ACM Transactions on the Web (TWEB)
Using WebDAV for improved certificate revocation and publication
EuroPKI'07 Proceedings of the 4th European conference on Public Key Infrastructure: theory and practice
Hi-index | 48.22 |
Problems arise when a protocol initially developed to simplify access to a distributed directory failed to take into account all the uses the directory was originally intended for.