A policy-based methodology for security evaluation: A Security Metric for Public Key Infrastructures
Journal of Computer Security
Computational techniques for increasing PKI policy comprehension by human analysts
Proceedings of the 9th Symposium on Identity and Trust on the Internet
A computational framework for certificate policy operations
EuroPKI'09 Proceedings of the 6th European conference on Public key infrastructures, services and applications
Using hierarchal change mining to manage network security policy evolution
Hot-ICE'11 Proceedings of the 11th USENIX conference on Hot topics in management of internet, cloud, and enterprise networks and services
An innovative policy-based cross certification methodology for public key infrastructures
EuroPKI'05 Proceedings of the Second European conference on Public Key Infrastructure
An interdomain PKI model based on trust lists
EuroPKI'07 Proceedings of the 4th European conference on Public Key Infrastructure: theory and practice
Hi-index | 0.00 |