Trust management in cross domain operations
暂无分享,去创建一个
[1] Anders Fongen. Scalability analysis of selected certificate validation scenarios , 2010, 2010 - MILCOM 2010 MILITARY COMMUNICATIONS CONFERENCE.
[2] William Yurcik,et al. A survey of PKI components and scalability issues , 2006, 2006 IEEE International Performance Computing and Communications Conference.
[3] Anders Fongen,et al. Identity Management and Integrity Protection in Publish-Subscribe Systems , 2013, IDMAN.
[4] Anders Fongen,et al. Federated Identity Management in a Tactical Multi-Domain Network , 2011 .
[5] A. Fongen. Protected and controlled communication between military and civilian networks , 2012, 2012 Military Communications and Information Systems Conference (MCC).
[6] Anders Fongen. Data-centric authorization and integrity control in a Linda tuplespace , 2015, SAC.
[7] Anders Fongen,et al. The Integration of Trusted Platform Modules into a Tactical Identity Management System , 2013, MILCOM 2013 - 2013 IEEE Military Communications Conference.
[8] Anders Fongen. Optimization of a Public Key Infrastructure , 2011, 2011 - MILCOM 2011 Military Communications Conference.
[9] Ronald L. Rivest,et al. Can We Eliminate Certificate Revocations Lists? , 1998, Financial Cryptography.
[10] Peter Gutmann,et al. PKI: It's Not Dead, Just Resting , 2002, Computer.
[11] David A. Cooper,et al. A model of certificate revocation , 1999, Proceedings 15th Annual Computer Security Applications Conference (ACSAC'99).
[12] Anders Fongen,et al. Trusted Service Discovery through Identity Management , 2013, MILCOM 2013 - 2013 IEEE Military Communications Conference.