International audienceIn distributed systems, especially in pervasive and ubiquitous environments, mobile users gather certificates providing them rights to access unknown and trusted environments. Such a certificate embeds increasing number of information that leads the certificate provider to adapt existing standards to its requirements. In this paper, we propose a new model of certification called X316 to set up an XML certificates with a contextual morph capability. This morph characteristic enables each certificate owner to disclose and to blind some sensitive certificate parts according to surrounding context. The usability of the X316 is illustrated with the "Chameleon" architecture offering users such a possible access if they appe...
Public-key infrastructures are increasingly being used as foundation for several security solutions,...
Pervasive environments are dynamically changing environments with enormous amounts of information av...
Interactions in electronic media require mutual trust to be established, preferably through the rele...
International audienceIn distributed systems, especially in pervasive and ubiquitous environments, m...
International audienceIn distributed systems especially in pervasive environments, the users usually...
International audienceNowadays the exchange of documents, information and data is fulfilled through ...
International audienceMost of industrial or public domains involve a trusted and distributed infrast...
International audienceThe challenge of pervasive computing consists in offering access to computing ...
International audienceThe challenge of pervasive computing consists inoffering access to computing s...
96 p.Thesis (Ph.D.)--University of Illinois at Urbana-Champaign, 2000.Traditionally, a system can on...
While the trust is easy to set up between the known participants of a communication, the evaluation ...
Since December 2009, the European Union Trusted Service Status Lists (TSLs) have been specified and ...
The problem of protecting mobile code from malicious hosts is an important security issue, for which...
The Internet enables connectivity between many strangers- entities that don't know each other. ...
Abstract—The challenge of pervasive computing consists in offering access to computing services anyw...
Public-key infrastructures are increasingly being used as foundation for several security solutions,...
Pervasive environments are dynamically changing environments with enormous amounts of information av...
Interactions in electronic media require mutual trust to be established, preferably through the rele...
International audienceIn distributed systems, especially in pervasive and ubiquitous environments, m...
International audienceIn distributed systems especially in pervasive environments, the users usually...
International audienceNowadays the exchange of documents, information and data is fulfilled through ...
International audienceMost of industrial or public domains involve a trusted and distributed infrast...
International audienceThe challenge of pervasive computing consists in offering access to computing ...
International audienceThe challenge of pervasive computing consists inoffering access to computing s...
96 p.Thesis (Ph.D.)--University of Illinois at Urbana-Champaign, 2000.Traditionally, a system can on...
While the trust is easy to set up between the known participants of a communication, the evaluation ...
Since December 2009, the European Union Trusted Service Status Lists (TSLs) have been specified and ...
The problem of protecting mobile code from malicious hosts is an important security issue, for which...
The Internet enables connectivity between many strangers- entities that don't know each other. ...
Abstract—The challenge of pervasive computing consists in offering access to computing services anyw...
Public-key infrastructures are increasingly being used as foundation for several security solutions,...
Pervasive environments are dynamically changing environments with enormous amounts of information av...
Interactions in electronic media require mutual trust to be established, preferably through the rele...