Show/Hide Menu
Hide/Show Apps
Logout
Türkçe
Türkçe
Search
Search
Login
Login
OpenMETU
OpenMETU
About
About
Open Science Policy
Open Science Policy
Open Access Guideline
Open Access Guideline
Postgraduate Thesis Guideline
Postgraduate Thesis Guideline
Communities & Collections
Communities & Collections
Help
Help
Frequently Asked Questions
Frequently Asked Questions
Guides
Guides
Thesis submission
Thesis submission
MS without thesis term project submission
MS without thesis term project submission
Publication submission with DOI
Publication submission with DOI
Publication submission
Publication submission
Supporting Information
Supporting Information
General Information
General Information
Copyright, Embargo and License
Copyright, Embargo and License
Contact us
Contact us
A new design of privilege management infrastructure with binding signature semantics
Date
2004-01-01
Author
Bıçakçı, Kemal
Baykal, Nazife
Metadata
Show full item record
This work is licensed under a
Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License
.
Item Usage Stats
204
views
0
downloads
Cite This
Just like PKI, used to support public key certificates, Privilege Management Infrastructure (PMI) is built to provide a foundation to employ attribute certificates. Although most of the PKI ideas can be applied to PMI as well, PMI has some unique characteristics for instance it should handle attributes containing confidential information. Motivating by this fact, Dawson et al. recently proposed a new PMI design for those who would like to use the outsourced PKI but keep the PMI management inside the organization. In this paper, we propose an alternative design to have a more fine-grained control over attribute certificates. Immediate revocation and simplified verification are two big advantages of our approach.
Subject Keywords
Digital signature
,
PMI
,
Attribute certificate
,
Revocation
,
Binding signature semantics
URI
https://hdl.handle.net/11511/55704
Journal
PUBLIC KEY INFRASTRUCTURE, PROCEEDINGS
DOI
https://doi.org/10.1007/978-3-540-25980-0_25
Collections
Graduate School of Informatics, Article
Suggestions
OpenMETU
Core
A size measurement method for enterprise applications
KÜÇÜKATEŞ ÖMÜRAL, NESLİHAN; Koçyiğit, Altan; Demirörs, Onur; Department of Information Systems (2022-8)
Enterprise Applications are complex, effort-intensive applications that include most of the business processes of the enterprises. They differ from traditional software applications by their high reuse rates. Effort predictions for these applications are usually performed in an ad-hoc fashion and result in large variations. Prediction models utilizing traditional software size measures do not produce accurate results either. In this thesis, we developed a size measurement method considering the unique chara...
A Fully decentralized framework for securely sharing digital content
Demir, Ahmet Serhat; Acar, Aybar Can; Department of Cyber Security (2019)
Blockchain is a secure, immutable, and distributed public ledger that stores transactional data. It enables information transfer without the need for a trusted third party via its decentralized consensus mechanism. Besides finance, blockchain technology has the potential to change several industries, through smart contracts and decentralized applications. This thesis explores using blockchain technology, smart contracts, and Ethereum Web 3.0 stack for secure information and file sharing on a fully decentral...
An automated quality measurement approach for business process models
Gürbüz, Özge; Demirörs, Onur; Güceğlioğlu, A. Selçuk; Department of Information Systems (2011)
Business process modeling has become a common need for organizations. Therefore process quality is also having an important role for the organizations. The most of the quality studies are based on cost and time which can be analyzed during or after the execution of the business processes. There are also quality measures which help analyzing measures before the execution of the business processes. This type of measures can give early feedback about the processes. There are three frameworks defined in the lit...
A size measurement method for Enterprise Applications
Ömüral, Neslihan Küçükateş; Demirörs, Onur (2022-01-01)
Enterprise Applications are known as one of the best practices of software reuse. They are complex applications, including most of the business processes. In this domain, size measurements and effort predictions are mostly performed in an ad-hoc fashion, and they frequently suffer from schedule and budget overruns. We developed a size measurement method for Enterprise Applications and explained this novel method in this paper. We categorized transactions as “unchanged”, “changed”, and “new” in this method. ...
A certificate based authentication control model using smart mobile devices for ubiquitous computing environments
Çavdar, Davut; Eren, Pekin Erhan; Department of Information Systems (2011)
In this thesis work, a certificate based authentication model supported by mobile devices is provided for ubiquitous computing environments. The model primarily aims to create an infrastructure for controlling and regulating access requests through mobile devices to local resources and services. The model also allows users from different domains to use local resources and services within the scope of agreements between domains. In addition to conceptual description of the model, a real prototype implementat...
Citation Formats
IEEE
ACM
APA
CHICAGO
MLA
BibTeX
K. Bıçakçı and N. Baykal, “A new design of privilege management infrastructure with binding signature semantics,”
PUBLIC KEY INFRASTRUCTURE, PROCEEDINGS
, pp. 306–313, 2004, Accessed: 00, 2020. [Online]. Available: https://hdl.handle.net/11511/55704.