Author of the publication

How Can I Trust an X.509 Certificate? An Analysis of the Existing Trust Approaches.

, , , , and . LCN, page 531-534. IEEE Computer Society, (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Persistent versus Dynamic Role Membership., , , and . DBSec, volume 142 of IFIP, page 344-357. Kluwer/Springer, (2003)RBAC Policies in XML for X.509 Based Privilege Management., and . SEC, volume 214 of IFIP Conference Proceedings, page 39-54. Kluwer, (2002)Enforcing "sticky" security policies throughout a distributed application., and . Middleware Security, page 1-6. ACM, (2008)Enabling the Autonomic Management of Federated Identity Providers., , , and . AIMS, volume 7943 of Lecture Notes in Computer Science, page 100-111. Springer, (2013)Attribute Aggregation in Federated Identity Management., and . Computer, 42 (5): 33-40 (2009)Smart Cards Aren't Always the Smart Choice.. Computer, 32 (12): 142-143 (1999)Improved Identity Management with Verifiable Credentials and FIDO., , , , , and . IEEE Commun. Stand. Mag., 3 (4): 14-20 (2019)Development of a Flexible PERMIS Authorisation Module for Shibboleth and Apache Server., , and . EuroPKI, volume 3545 of Lecture Notes in Computer Science, page 162-179. Springer, (2005)Experiences of Applying Advanced Grid Authorisation Infrastructures., , , and . EGC, volume 3470 of Lecture Notes in Computer Science, page 265-274. Springer, (2005)Enabling Privacy-Preserving Sharing of Cyber Threat Information in the Cloud., , , , , , , and . CSCloud/EdgeCom, page 74-80. IEEE, (2019)