Third generation city-wide distributed surveillance systems are built upon networks of sensors, actuators and computation nodes. In such large systems, different groups of nodes may belong to separate parties who want to control access to the resources provided by their nodes. The access control mechanism must verify the identities of nodes and check their authorization for accessing resources. The system must also support dynamic group reconfiguration mandated by factors such as changes in organizational structure or confidentiality rules and recover gracefully from security breaches. This paper presents a mechanism based on Public Key Infrastructure (PKI) and certificate hierarchies for fulfilling these requirements in a secure communicat...
The Internet has opened new ways of communication between individuals, organisations and businesses....
This paper describes a flexible and general purpose PKI platform providing an easily interoperable s...
AbstractWhen attacking a distributed protocol, an adaptive adversary is able to determine its action...
Managing a modern IP-based city-wide surveillance system requires that sensors and actuators in the ...
Mainly for scalability reasons, many cryptographic se-curity protocols make use of public key crypto...
Conventionally, public key certificates bind one subject with one static public key so that the subj...
The use of insecure networks -such as the Internet- to send and receive information has made the nee...
Abstract. The Public Key Infrastructure (PKI) technology is very im-portant to support secure global...
AbstractThe paper describes some special aspects of the security infrastructure for distributed com-...
Includes bibliographical references (page 31).Security for electronic commerce has become increasing...
A public key infrastructure (PKI) secures lots of applications and processes. These are for example ...
Security mechanisms can only be effective if they are usable as well. Above all, this statement appl...
Published online: 22 June 2013. This paper is an improved version of “Security Infrastructures: Tow...
Authentication has traditionally been done either in a decentralized manner with human assistance or...
Public key authentication is the verification of the identity-public key binding, and is foundationa...
The Internet has opened new ways of communication between individuals, organisations and businesses....
This paper describes a flexible and general purpose PKI platform providing an easily interoperable s...
AbstractWhen attacking a distributed protocol, an adaptive adversary is able to determine its action...
Managing a modern IP-based city-wide surveillance system requires that sensors and actuators in the ...
Mainly for scalability reasons, many cryptographic se-curity protocols make use of public key crypto...
Conventionally, public key certificates bind one subject with one static public key so that the subj...
The use of insecure networks -such as the Internet- to send and receive information has made the nee...
Abstract. The Public Key Infrastructure (PKI) technology is very im-portant to support secure global...
AbstractThe paper describes some special aspects of the security infrastructure for distributed com-...
Includes bibliographical references (page 31).Security for electronic commerce has become increasing...
A public key infrastructure (PKI) secures lots of applications and processes. These are for example ...
Security mechanisms can only be effective if they are usable as well. Above all, this statement appl...
Published online: 22 June 2013. This paper is an improved version of “Security Infrastructures: Tow...
Authentication has traditionally been done either in a decentralized manner with human assistance or...
Public key authentication is the verification of the identity-public key binding, and is foundationa...
The Internet has opened new ways of communication between individuals, organisations and businesses....
This paper describes a flexible and general purpose PKI platform providing an easily interoperable s...
AbstractWhen attacking a distributed protocol, an adaptive adversary is able to determine its action...