Delegation is frequently used in real world. In order to make it possible in on-line, the fact of delegation should be protected from malicious modification and the right of a proxy should be controlled properly. This paper describes security requirements and proxy certificate and proposes a practical method of restriction of a proxy. Finally, the prototype implementation is addressed
A proxy signature scheme permits an entity to delegate its signing rights to another entity. These s...
AbstractThe paper describes some special aspects of the security infrastructure for distributed com-...
Abstract. Trust Management systems use security credentials to determine whether action requests are...
Delegation is the process wherein an entity Alice designates an entity Bob to speak on her behalf. I...
Proxy credentials are commonly used in security systems when one entity wishes to grant to another e...
Delegation is a process where a delegator grants or authorizes all or some of his/her power to anoth...
WOS: 000525736500001Proxy signature is a cryptographic primitive that allows an entity to delegate s...
Delegation is the process wherein an entity Alice designates an entity Bob to speak on her behalf. I...
Abstract. Delegation is a mechanism that allows a user A to act on another user B’s behalf by making...
This paper presents a novel method that allows the delegation of signature power to one or more enti...
Abstract: The increasing number of clients and users of e-banking, e-government and e-application th...
Delegation certificates (e.g. SPKI) support the decentralized management of access rights in organiz...
Delegation is the process whereby a user in a distributed environ-ment authorizes a system to access...
Performing sensitive online transactions using computers found in cybercafés and public libraries is...
This document specifies an Internet standards track protocol for the Internet community, and request...
A proxy signature scheme permits an entity to delegate its signing rights to another entity. These s...
AbstractThe paper describes some special aspects of the security infrastructure for distributed com-...
Abstract. Trust Management systems use security credentials to determine whether action requests are...
Delegation is the process wherein an entity Alice designates an entity Bob to speak on her behalf. I...
Proxy credentials are commonly used in security systems when one entity wishes to grant to another e...
Delegation is a process where a delegator grants or authorizes all or some of his/her power to anoth...
WOS: 000525736500001Proxy signature is a cryptographic primitive that allows an entity to delegate s...
Delegation is the process wherein an entity Alice designates an entity Bob to speak on her behalf. I...
Abstract. Delegation is a mechanism that allows a user A to act on another user B’s behalf by making...
This paper presents a novel method that allows the delegation of signature power to one or more enti...
Abstract: The increasing number of clients and users of e-banking, e-government and e-application th...
Delegation certificates (e.g. SPKI) support the decentralized management of access rights in organiz...
Delegation is the process whereby a user in a distributed environ-ment authorizes a system to access...
Performing sensitive online transactions using computers found in cybercafés and public libraries is...
This document specifies an Internet standards track protocol for the Internet community, and request...
A proxy signature scheme permits an entity to delegate its signing rights to another entity. These s...
AbstractThe paper describes some special aspects of the security infrastructure for distributed com-...
Abstract. Trust Management systems use security credentials to determine whether action requests are...