rent-now

Rent More, Save More! Use code: ECRENTAL

5% off 1 book, 7% off 2 books, 10% off 3+ books

9783540280620

Public Key Infrastructure: Second European PKI Workshop: Research And Applications, EuroPKI 2005, Canterbury, UK, June 30 - July 1, 2005, Revised Selected Papers

by ; ;
  • ISBN13:

    9783540280620

  • ISBN10:

    3540280626

  • Format: Paperback
  • Copyright: 2006-01-15
  • Publisher: Springer Verlag
  • Purchase Benefits
List Price: $99.00 Save up to $79.20
  • Digital
    $42.90
    Add to Cart

    DURATION
    PRICE

Summary

This book constitutes the thoroughly refereed post-proceedings of the 2nd European Public Key Infrastructure Workshop: Research and Applications, EuroPKI 2005, held in Canterbury, UK, in June/July 2005. The 18 revised full papers presented were carefully reviewed and selected from 43 submissions. The papers are organized in topical sections on authorization, risks/attacks to PKI systems, interoperability between systems, evaluating a CA, ID ring based signatures, new protocols, practical implementations, and long term archiving.

Table of Contents

Authorisation
A Multipurpose Delegation Proxy for WWW Credentials
Tobias Straub, Thilo-Alexander Ginkel, Johannes Bachmann
1(21)
Secure Role Activation and Authorization in the Enterprise Environment
Richard W.C. Lui, Lucas C.K. Hui, S.M. Yiu
22(14)
Towards a Unified Authentication and Authorization Infrastructure for Grid Services: Implementing an Enhanced OCSP Service Provider into GT4
Jesus Luna, Manel Medina, Oscar Manso
36(19)
Interoperability
A Heterogeneous Network Access Service Based on PERMIS and SAML
Gabriel López, Óscar Cánovas, Antonio F. Gómez-Skarmeta, Sassa Otenko, David W. Chadwick
55(18)
Interoperation Between a Conventional PKI and an ID-Based Infrastructure
Geraint Price, Chris J. Mitchell
73(13)
XKMS Working Group Interoperability Status Report
Guillermo Álvaro, Stephen Farrell, Tommy Lindberg, Roland Lockhart, Yunhao Zhang
86(14)
Evaluating a CA
An Innovative Policy-Based Cross Certification Methodology for Public Key Infrastructures
Valentina Casola, Antonino Mazzeo, Nicola Mazzocca, Massimiliano Rak
100(18)
Modeling Public Key Infrastructures in the Real World
John Marchesini, Sean Smith
118(17)
Classifying Public Key Certificates
Javier Lopez, Rolf Oppliger, Günther Pernul
135(9)
ID Based Ring Signatures
Identity Based Ring Signature: Why, How and What Next
Sherman S.M. Chow, Richard W.C. Lui, Lucas C.K. Hui, S.M. Yiu
144(18)
Practical Implementations
Development of a Flexible PERMIS Authorisation Module for Shibboleth and Apache Server
Wensheng Xu, David W. Chadwick, Sassa Otenko
162(18)
CA-in-a-Box
Mark Franklin, Kevin Mitcham, Sean Smith, Joshua Stabiner, Omen Wild
180(11)
New Protocols
A Lower-Bound of Complexity for RSA-Based Password-Authenticated Key Exchange
SeongHan Shin, Kazukuni Kobara, Hideki Imai
191(15)
Recoverable and Untraceable E-cash
Joseph K. Liu, Patrick P. Tsang, Duncan S. Wong
206(9)
Risks and Attacks
A Method for Detecting the Exposure of OCSP Responder's Session Private Key in D-OCSP-KIS
Younggyo Lee, Injung Kim, Seungjoo Kim, Dongho Won
215(12)
Installing Fake Root Keys in a PC
Adil Alsaid, Chris J. Mitchell
227(13)
Long Term Archiving
Provision of Long-Term Archiving Service For Digitally Signed Documents Using an Archive Interaction Protocol
Aleksej Jerman Blazic, Peter Sylvester
240(15)
Legal Security for Transformations of Signed Documents: Fundamental Concepts
Andreas U. Schmidt, Zbynek Loebl
255(16)
Author Index 271

Supplemental Materials

What is included with this book?

The New copy of this book will include any supplemental materials advertised. Please check the title of the book to determine if it should include any access cards, study guides, lab manuals, CDs, etc.

The Used, Rental and eBook copies of this book are not guaranteed to include any supplemental materials. Typically, only the book itself is included. This is true even if the title states it includes any access cards, study guides, lab manuals, CDs, etc.

Rewards Program