Abstract is missing.
- A Multipurpose Delegation Proxy for WWW CredentialsTobias Straub, Thilo-Alexander Ginkel, Johannes Buchmann. 1-21 [doi]
- Secure Role Activation and Authorization in the Enterprise EnvironmentRichard W. C. Lui, Lucas Chi Kwong Hui, Siu-Ming Yiu. 22-35 [doi]
- Towards a Unified Authentication and Authorization Infrastructure for Grid Services: Implementing an Enhanced OCSP Service Provider into GT4Jesus Luna, Manel Medina, Oscar Manso. 36-54 [doi]
- A Heterogeneous Network Access Service Based on PERMIS and SAMLGabriel López Millán, Óscar Cánovas Reverte, Antonio F. Gómez-Skarmeta, Sassa Otenko, David W. Chadwick. 55-72 [doi]
- Interoperation Between a Conventional PKI and an ID-Based InfrastructureGeraint Price, Chris J. Mitchell. 73-85 [doi]
- XKMS Working Group Interoperability Status ReportGuillermo Álvaro, Stephen Farrell, Tommy Lindberg, Roland Lockhart, Yunhao Zhang. 86-99 [doi]
- An Innovative Policy-Based Cross Certification Methodology for Public Key InfrastructuresValentina Casola, Antonino Mazzeo, Nicola Mazzocca, Massimiliano Rak. 100-117 [doi]
- Modeling Public Key Infrastructures in the Real WorldJohn Marchesini, Sean W. Smith. 118-134 [doi]
- Classifying Public Key CertificatesJavier Lopez, Rolf Oppliger, Günther Pernul. 135-143 [doi]
- Identity Based Ring Signature: Why, How and What NextSherman S. M. Chow, Richard W. C. Lui, Lucas Chi Kwong Hui, Siu-Ming Yiu. 144-161 [doi]
- Development of a Flexible PERMIS Authorisation Module for Shibboleth and Apache ServerWensheng Xu, David W. Chadwick, Sassa Otenko. 162-179 [doi]
- CA-in-a-BoxMark Franklin, Kevin Mitcham, Sean W. Smith, Joshua Stabiner, Omen Wild. 180-190 [doi]
- A Lower-Bound of Complexity for RSA-Based Password-Authenticated Key ExchangeSeongHan Shin, Kazukuni Kobara, Hideki Imai. 191-205 [doi]
- Recoverable and Untraceable E-CashJoseph K. Liu, Patrick P. Tsang, Duncan S. Wong. 206-214 [doi]
- A Method for Detecting the Exposure of OCSP Responder s Session Private Key in D-OCSP-KISYoungGyo Lee, In-Jung Kim, Seungjoo Kim, Dongho Won. 215-226 [doi]
- Installing Fake Root Keys in a PCAdil Alsaid, Chris J. Mitchell. 227-239 [doi]
- Provision of Long-Term Archiving Service for Digitally Signed Documents Using an Archive Interaction ProtocolAleksej Jerman Blazic, Peter Sylvester. 240-254 [doi]
- Legal Security for Transformations of Signed Documents: Fundamental ConceptsAndreas U. Schmidt, Zbynek Loebl. 255-270 [doi]