International audienceMost of industrial or public domains involve a trusted and distributed infrastructure which provides individuals digital credentials and certificates. These latter allow their owner to authenticate herself, prove her rights and gain access inside trusted organizations. The certificate usability scope is extended to contain more and more information, where someones can be considered as sensitive. Contrary to existing certificate standards, we aim to provide a flexible format of certificate enabling to disclose, to blind and to cipher any authorized part of a certificate according to the user context, environment and willing. In this paper, we define and describe a new certificate model called: "X316" and we supply a se...
Web software that is designed and deployed to collect end-user information and transmit it to a remo...
International audienceThe challenge of pervasive computing consists in offering access to computing ...
Web software that is designed and deployed to collect end-user information and transmit it to a remo...
International audienceMost of industrial or public domains involve a trusted and distributed infrast...
International audienceIn distributed systems especially in pervasive environments, the users usually...
International audienceIn distributed systems, especially in pervasive and ubiquitous environments, m...
Interactions in electronic media require mutual trust to be established, preferably through the rele...
Abstract: The increasing number of clients and users of e-banking, e-government and e-application th...
A public key infrastructure (PKI) secures lots of applications and processes. These are for example ...
This work deals with the possibilities of using digital certificates and certification authorities o...
With the widespread use of Internet, Web, and mobile technologies, a new category of applications an...
There are many problems connected with practical implementation of certification authority. Correspo...
Abstract:Today almost all organizations in the world are network-centric paradigm and to safeguard t...
Public-key infrastructures are increasingly being used as foundation for several security solutions,...
Certificate management is a crucial element in PKI implementations, which includes certificate gener...
Web software that is designed and deployed to collect end-user information and transmit it to a remo...
International audienceThe challenge of pervasive computing consists in offering access to computing ...
Web software that is designed and deployed to collect end-user information and transmit it to a remo...
International audienceMost of industrial or public domains involve a trusted and distributed infrast...
International audienceIn distributed systems especially in pervasive environments, the users usually...
International audienceIn distributed systems, especially in pervasive and ubiquitous environments, m...
Interactions in electronic media require mutual trust to be established, preferably through the rele...
Abstract: The increasing number of clients and users of e-banking, e-government and e-application th...
A public key infrastructure (PKI) secures lots of applications and processes. These are for example ...
This work deals with the possibilities of using digital certificates and certification authorities o...
With the widespread use of Internet, Web, and mobile technologies, a new category of applications an...
There are many problems connected with practical implementation of certification authority. Correspo...
Abstract:Today almost all organizations in the world are network-centric paradigm and to safeguard t...
Public-key infrastructures are increasingly being used as foundation for several security solutions,...
Certificate management is a crucial element in PKI implementations, which includes certificate gener...
Web software that is designed and deployed to collect end-user information and transmit it to a remo...
International audienceThe challenge of pervasive computing consists in offering access to computing ...
Web software that is designed and deployed to collect end-user information and transmit it to a remo...