Results 51 to 60 of about 119,685 (321)

BRT: An Efficient and Scalable Blockchain-Based Revocation Transparency System for TLS Connections

open access: yesSensors, 2023
Log-based public key infrastructure(PKI) refers to a robust class of CA-attack-resilient PKI that enhance transparency and accountability in the certificate revocation and issuance process by compelling certificate authorities (CAs) to submit revocations
Qianqian Xing   +6 more
doaj   +1 more source

Context dependent revocation in delegated XACML [PDF]

open access: yes, 2008
The XACML standard defines an XML based language for defining access control policies and a related processing model. Recent work aims to add delegation to XACML in order to express the right to administrate XACML policies within XACML itself.
Rissanen, Eric, Seitz, Ludwig
core   +1 more source

Analiza impactului social al ieșirii din îngrijire în ultimii 10 ani în România [PDF]

open access: yesDrepturile Omului, 2020
This paper analyses the social impact following the leaving from care of young people for whom the measure of special protection was revoked or has expired after reaching the age of 18, respectively of young people preparing to leave care in the next two
Vișinel Costel Bălan
doaj  

Executive Orders: Issuance, Modification, and Revocation [PDF]

open access: yes, 2014
Executive orders, presidential memoranda, and proclamations are used extensively by Presidents to achieve policy goals, set uniform standards for managing the executive branch, or outline a policy view intended to influence the behavior of private ...
Chu, Vivian S, Garvey, Todd
core   +1 more source

PKI Safety Net (PKISN): Addressing the Too-Big-to-Be-Revoked Problem of the TLS Ecosystem

open access: yes, 2016
In a public-key infrastructure (PKI), clients must have an efficient and secure way to determine whether a certificate was revoked (by an entity considered as legitimate to do so), while preserving user privacy.
Chuat, Laurent   +2 more
core   +1 more source

Trust model for certificate revocation in Ad hoc networks [PDF]

open access: yes, 2007
In this paper we propose a distributed trust model for certificate revocation in Adhoc networks. The proposed model allows trust to be built over time as the number of interactions between nodes increase.
Gheorghita Ghinea   +9 more
core   +1 more source

PPAC-CDW: A Privacy-Preserving Access Control Scheme With Fast OLAP Query and Efficient Revocation for Cloud Data Warehouse

open access: yesIEEE Access
Achieving privacy-preserving analytical query with fine-grained access control for cloud-based data warehouse (CDW) through the use of online analytical processing (OLAP) tool is a real challenge.
Somchart Fugkeaw, Lyhour Hak
doaj   +1 more source

Advances in Regulating Strategies and Applications of Ferroelectric Materials

open access: yesAdvanced Physics Research, EarlyView.
To meet the demand for precise control of performance in nanoelectronic devices, this paper systematically reviews the latest advances in controlling ferroelectric properties through strategies such as external field modulation, low‐dimensional confinement, interface engineering, and topological structure design.
Jianying Ji, Cong Liu, Dan Luo, Zhou Li
wiley   +1 more source

Blockchain-Enabled Privacy-Preserving Access Control for EHRs Sharing With Optimized User and Attribute Revocation

open access: yesIET Information Security
Electronic health records (EHRs) have become a crucial application in cloud computing environments, necessitating advanced privacy-preserving access control mechanisms. Ciphertext policy attribute-based encryption (CP-ABE) is a widely recognized solution
Khanadech Worapaluk, Somchart Fugkeaw
doaj   +1 more source

An Efficient Lightweight Authentication Scheme for Smart Meter

open access: yesMathematics
With the rapid development of the information age, smart meters play an important role in the smart grid. However, there are more and more attacks on smart meters, which mainly focus on the identity authentication of smart meters and the security ...
Jingqi Du   +5 more
doaj   +1 more source

Home - About - Disclaimer - Privacy