Results 51 to 60 of about 119,685 (321)
BRT: An Efficient and Scalable Blockchain-Based Revocation Transparency System for TLS Connections
Log-based public key infrastructure(PKI) refers to a robust class of CA-attack-resilient PKI that enhance transparency and accountability in the certificate revocation and issuance process by compelling certificate authorities (CAs) to submit revocations
Qianqian Xing +6 more
doaj +1 more source
Context dependent revocation in delegated XACML [PDF]
The XACML standard defines an XML based language for defining access control policies and a related processing model. Recent work aims to add delegation to XACML in order to express the right to administrate XACML policies within XACML itself.
Rissanen, Eric, Seitz, Ludwig
core +1 more source
Analiza impactului social al ieșirii din îngrijire în ultimii 10 ani în România [PDF]
This paper analyses the social impact following the leaving from care of young people for whom the measure of special protection was revoked or has expired after reaching the age of 18, respectively of young people preparing to leave care in the next two
Vișinel Costel Bălan
doaj
Executive Orders: Issuance, Modification, and Revocation [PDF]
Executive orders, presidential memoranda, and proclamations are used extensively by Presidents to achieve policy goals, set uniform standards for managing the executive branch, or outline a policy view intended to influence the behavior of private ...
Chu, Vivian S, Garvey, Todd
core +1 more source
PKI Safety Net (PKISN): Addressing the Too-Big-to-Be-Revoked Problem of the TLS Ecosystem
In a public-key infrastructure (PKI), clients must have an efficient and secure way to determine whether a certificate was revoked (by an entity considered as legitimate to do so), while preserving user privacy.
Chuat, Laurent +2 more
core +1 more source
Trust model for certificate revocation in Ad hoc networks [PDF]
In this paper we propose a distributed trust model for certificate revocation in Adhoc networks. The proposed model allows trust to be built over time as the number of interactions between nodes increase.
Gheorghita Ghinea +9 more
core +1 more source
Achieving privacy-preserving analytical query with fine-grained access control for cloud-based data warehouse (CDW) through the use of online analytical processing (OLAP) tool is a real challenge.
Somchart Fugkeaw, Lyhour Hak
doaj +1 more source
Advances in Regulating Strategies and Applications of Ferroelectric Materials
To meet the demand for precise control of performance in nanoelectronic devices, this paper systematically reviews the latest advances in controlling ferroelectric properties through strategies such as external field modulation, low‐dimensional confinement, interface engineering, and topological structure design.
Jianying Ji, Cong Liu, Dan Luo, Zhou Li
wiley +1 more source
Electronic health records (EHRs) have become a crucial application in cloud computing environments, necessitating advanced privacy-preserving access control mechanisms. Ciphertext policy attribute-based encryption (CP-ABE) is a widely recognized solution
Khanadech Worapaluk, Somchart Fugkeaw
doaj +1 more source
An Efficient Lightweight Authentication Scheme for Smart Meter
With the rapid development of the information age, smart meters play an important role in the smart grid. However, there are more and more attacks on smart meters, which mainly focus on the identity authentication of smart meters and the security ...
Jingqi Du +5 more
doaj +1 more source

