Mäkinen et al., 2001 - Google Patents
Jini & Friends@ Work: Towards secure service accessMäkinen et al., 2001
View PDF- Document ID
- 9629239768350960404
- Author
- Mäkinen S
- Kehr R
- AG D
- Schmitz R
- Vieira F
- SA P
- Wall T
- Publication year
External Links
Snippet
Jini specification does not state what kind of a security infrastructure should be used to ensure secure transactions between parties in a Jini community. Public Key Infrastructure (PKI) and the newer Simple Public Key Infrastructure (SPKI) seem to be the best …
- 230000002269 spontaneous 0 abstract description 20
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| EP1312191B1 (en) | Method and system for authentification of a mobile user via a gateway | |
| Humphrey et al. | Security for grids | |
| EP1782213B1 (en) | Secure messaging system with derived keys | |
| US7320073B2 (en) | Secure method for roaming keys and certificates | |
| US20010020228A1 (en) | Umethod, system and program for managing relationships among entities to exchange encryption keys for use in providing access and authorization to resources | |
| US20050154889A1 (en) | Method and system for a flexible lightweight public-key-based mechanism for the GSS protocol | |
| US20020144109A1 (en) | Method and system for facilitating public key credentials acquisition | |
| JPH10308733A (en) | Method for providing secure communication and apparatus for providing secure directory service | |
| GB2378010A (en) | Mulit-Domain authorisation and authentication | |
| Hunt | Technological infrastructure for PKI and digital certification | |
| Bhiogade | Secure socket layer | |
| Hsu et al. | Intranet security framework based on short-lived certificates | |
| Yeh et al. | Applying lightweight directory access protocol service on session certification authority | |
| Muftic et al. | Security architecture for distributed systems | |
| Mäkinen et al. | Jini & Friends@ Work: Towards secure service access | |
| Boeyen et al. | Liberty trust models guidelines | |
| Haidar et al. | Critical evaluation of current approaches to grid security | |
| Sharp | Information Security in the Enterprise | |
| Sultan et al. | Overcoming Barriers to Client-Side Digital Certificate Adoption | |
| Wang et al. | Reducing the Dependence of SPKI/SDSI on PKI | |
| Boeyen et al. | Trust models guidelines | |
| Chapman et al. | OMII Grid Security Technology Overview | |
| Ortiz | Will PKI Become a Key to Online Security? | |
| Patriciu et al. | Deploying a certification authority for networks security | |
| Bisbal | Public Key Distribution and Authentication Using LDAP |