نتایج جستجو برای: surrogacy contract revocation
تعداد نتایج: 46312 فیلتر نتایج به سال:
Recent literature presents several rooted tree based member deletion/revocation schemes [20, 21, 22, 24, 4, 5] trying to simultaneously minimize the key storage while providing e cient member deletion/revocation. Many of these approaches have di erent solutions and provide di erent values for the number of keys to be stored and distributed. In this paper, we show that many of these papers can b...
Public key infrastructure has been proposed as a promising foundation for verifying the authenticity of communicating parties and transferring trust over the internet. One of the key issues in public key infrastructure is how to manage certificate revocations. Various technical solutions dealing with key revocation have been proposed. However, to the best of our best knowledge, no rigorous effo...
With cloud computing, data owners are motivated to outsource their data from local sites to public cloud for great flexibility and economic saving. Recently, some research consider the problem of secure and efficient public data integrity auditing for shared dynamic data. But this scheme is not secure against collusion of cloud storage server. An efficient public integrity auditing with a secur...
Several interesting group signature schemes have been proposed todate. However, in order for the entire group signature concept to become practical and credible, the problem of secure and efficient group member revocation must be addressed. In this paper, we construct a new revocation method for group signatures based on the signature scheme by Ateniese et al. [ACJT]. This new method represents...
The issue of certificate revocation in mobile ad hoc networks (MANETs) where there are no on-line access to trusted authorities, is a challenging problem. In wired network environments, when certificates are to be revoked, certificate authorities (CAs) add the information regarding the certificates in question to certificate revocation lists (CRLs) and post the CRLs on accessible repositories o...
This paper presents an effective method to integrate the revocation mechanism into some group signature schemes that are based on the strong RSA assumption. The mechanism enables the group manager to either update a group member’s certificates, or revoke a group member. More specifically, a generic method has been proposed for the protocols of sign, verify, and revocation. We demonstrate the ef...
The XACML standard defines an XML based language for defining access control policies and a related processing model. Recent work aims to add delegation to XACML in order to express the right to administrate XACML policies within XACML itself. The delegation profile draft explains how to validate the right to issue a policy, but there are no provisions for removing a policy. This paper proposes...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید