Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

PERMIS: a modular authorization infrastructure., , , , , and . Concurr. Comput. Pract. Exp., 20 (11): 1341-1357 (2008)Authorisation in Grid computing.. Inf. Secur. Tech. Rep., 10 (1): 33-40 (2005)Recognition of Authority in Virtual Organisations., , and . TrustBus, volume 4657 of Lecture Notes in Computer Science, page 3-13. Springer, (2007)Using WebDAV for Improved Certificate Revocation and Publication., and . EuroPKI, volume 4582 of Lecture Notes in Computer Science, page 265-279. Springer, (2007)Merging and extending the PGP and PEM trust models-the ICE-TEL trust model., , and . IEEE Netw., 11 (3): 16-24 (1997)Managing the X.500 Root Naming Context.. RFC, (March 1997)Establishing Trust in SSI Verifiers., , , and . Open Identity Summit, volume P-335 of LNI, Gesellschaft für Informatik e.V., (2023)A novel approach to establish trust in verifiable credential issuers in Self-sovereign identity ecosystems using TRAIN., , and . Open Identity Summit, volume P-325 of LNI, page 27-38. Gesellschaft für Informatik e.V., (2022)Enabling the Internet White Pages Service - the Directory Guardian., and . NDSS, The Internet Society, (1998)Privacy and Civil Liberties., , , , and . DBSec, volume 256 of IFIP Conference Proceedings, page 331-346. Kluwer, (2002)