Applied public key infrastructure :: 4th International Workshop : IWAP 2005 /
Over the past years, Public Key Infrastructure (PKI) technology has evolved and moved from the research laboratories to the mainstream, in which many organizations are now leveraging it as part of their core infrastructure system for providing and building security in their businesses. Understanding...
Gespeichert in:
Körperschaft: | |
---|---|
Weitere Verfasser: | |
Format: | Elektronisch Tagungsbericht E-Book |
Sprache: | English |
Veröffentlicht: |
Amsterdam ; Washington, DC :
IOS Press,
©2005.
|
Schriftenreihe: | Frontiers in artificial intelligence and applications ;
v. 128. |
Schlagworte: | |
Online-Zugang: | Volltext |
Zusammenfassung: | Over the past years, Public Key Infrastructure (PKI) technology has evolved and moved from the research laboratories to the mainstream, in which many organizations are now leveraging it as part of their core infrastructure system for providing and building security in their businesses. Understanding the challenges and requirements of PKI related operations through the sharing of case studies are critical to supporting the continued research and development of PKI technologies and related systems and appliations to further progress and innovate for enhancing future development and evolution of PKI in the enterprises. This publication includes topics such as: PKI Operation & Case Study; Non-repudiation; Authorization & Access Control, Authentication & Time-tamping, Certificate Validation & Revocation and Cryptographic Applications. |
Beschreibung: | 1 online resource (x, 265 pages) : illustrations |
Format: | Master and use copy. Digital master created according to Benchmark for Faithful Digital Reproductions of Monographs and Serials, Version 1. Digital Library Federation, December 2002. |
Bibliographie: | Includes bibliographical references and author index. |
ISBN: | 1423799690 9781423799696 9781607501367 1607501368 6610505004 1280505001 9781280505003 9786610505005 6000003455 9786000003456 1601291175 9781601291172 |
Internformat
MARC
LEADER | 00000cam a2200000 a 4500 | ||
---|---|---|---|
001 | ZDB-4-EBA-ocn228144574 | ||
003 | OCoLC | ||
005 | 20241004212047.0 | ||
006 | m o d | ||
007 | cr cn||||||||| | ||
008 | 050722s2005 ne a ob 101 0 eng d | ||
010 | |a 2005931171 | ||
040 | |a Nz |b eng |e pn |c UV0 |d OCLCQ |d N$T |d YDXCP |d IOSPR |d OCLCE |d IDEBK |d OCLCQ |d DKDLA |d MERUC |d CCO |d E7B |d MHW |d OCLCQ |d OCLCO |d OCLCF |d OCL |d OCLCQ |d EBLCP |d OCLCQ |d AZK |d OCLCQ |d LOA |d AGLDB |d MOR |d PIFBR |d ZCU |d OCLCQ |d U3W |d BRL |d STF |d WRM |d OCLCQ |d VTS |d ICG |d NRAMU |d EZ9 |d MOQ |d INT |d VT2 |d OCLCQ |d WYU |d G3B |d OCLCQ |d DKC |d CEF |d OCLCQ |d UX1 |d CNNOR |d ADU |d UKCRE |d VLY |d AU@ |d OCLCQ |d OCLCO |d M8D |d SFB |d OCLCO |d OCLCQ |d OCLCO |d OCLCL | ||
019 | |a 71550831 |a 148603139 |a 228144575 |a 474161474 |a 488325084 |a 491259298 |a 560230706 |a 607774945 |a 647517823 |a 657537613 |a 722472958 |a 728019579 |a 744968345 |a 814456755 |a 824550542 |a 961589593 |a 962652907 |a 965973553 |a 974201061 |a 974455834 |a 980253677 |a 988523134 |a 991584207 |a 991989982 |a 1005639747 |a 1017996862 |a 1037463753 |a 1038670811 |a 1042317824 |a 1045526033 |a 1049072403 |a 1055256959 |a 1055328336 |a 1066439470 |a 1081240052 |a 1096477179 |a 1100531499 |a 1101719070 |a 1112243845 |a 1113173644 |a 1119036959 |a 1119966136 |a 1135961701 |a 1153540117 |a 1162558192 |a 1228564236 |a 1241846695 |a 1290078431 |a 1300653318 | ||
020 | |a 1423799690 |q (electronic bk.) | ||
020 | |a 9781423799696 |q (electronic bk.) | ||
020 | |a 9781607501367 | ||
020 | |a 1607501368 | ||
020 | |a 6610505004 | ||
020 | |a 1280505001 | ||
020 | |a 9781280505003 | ||
020 | |a 9786610505005 | ||
020 | |a 6000003455 | ||
020 | |a 9786000003456 | ||
020 | |a 1601291175 | ||
020 | |a 9781601291172 | ||
020 | |z 1586035509 | ||
020 | |z 9781586035501 | ||
035 | |a (OCoLC)228144574 |z (OCoLC)71550831 |z (OCoLC)148603139 |z (OCoLC)228144575 |z (OCoLC)474161474 |z (OCoLC)488325084 |z (OCoLC)491259298 |z (OCoLC)560230706 |z (OCoLC)607774945 |z (OCoLC)647517823 |z (OCoLC)657537613 |z (OCoLC)722472958 |z (OCoLC)728019579 |z (OCoLC)744968345 |z (OCoLC)814456755 |z (OCoLC)824550542 |z (OCoLC)961589593 |z (OCoLC)962652907 |z (OCoLC)965973553 |z (OCoLC)974201061 |z (OCoLC)974455834 |z (OCoLC)980253677 |z (OCoLC)988523134 |z (OCoLC)991584207 |z (OCoLC)991989982 |z (OCoLC)1005639747 |z (OCoLC)1017996862 |z (OCoLC)1037463753 |z (OCoLC)1038670811 |z (OCoLC)1042317824 |z (OCoLC)1045526033 |z (OCoLC)1049072403 |z (OCoLC)1055256959 |z (OCoLC)1055328336 |z (OCoLC)1066439470 |z (OCoLC)1081240052 |z (OCoLC)1096477179 |z (OCoLC)1100531499 |z (OCoLC)1101719070 |z (OCoLC)1112243845 |z (OCoLC)1113173644 |z (OCoLC)1119036959 |z (OCoLC)1119966136 |z (OCoLC)1135961701 |z (OCoLC)1153540117 |z (OCoLC)1162558192 |z (OCoLC)1228564236 |z (OCoLC)1241846695 |z (OCoLC)1290078431 |z (OCoLC)1300653318 | ||
037 | |a 978-1-58603-550-1 |b IOS Press |n http://www.iospress.nl | ||
042 | |a dlr | ||
050 | 4 | |a QA76.9.A25 |b I558 2005eb | |
072 | 7 | |a COM |x COM004000 |2 bisacsh | |
072 | 7 | |a K |2 bicssc | |
082 | 7 | |a 005.8/2 |2 22 | |
049 | |a MAIN | ||
111 | 2 | |a International Workshop for Applied PKI |n (4th : |d 2005 : |c Singapore) | |
245 | 1 | 0 | |a Applied public key infrastructure : |b 4th International Workshop : IWAP 2005 / |c edited by Jianying Zhou [and others]. |
246 | 3 | 0 | |a IWAP 2005 |
260 | |a Amsterdam ; |a Washington, DC : |b IOS Press, |c ©2005. | ||
300 | |a 1 online resource (x, 265 pages) : |b illustrations | ||
336 | |a text |b txt |2 rdacontent | ||
337 | |a computer |b c |2 rdamedia | ||
338 | |a online resource |b cr |2 rdacarrier | ||
347 | |a data file | ||
490 | 1 | |a Frontiers in artificial intelligence and applications ; |v v. 128 | |
504 | |a Includes bibliographical references and author index. | ||
505 | 0 | |a Title page; Preface; Program Committee; Contents; PKI Operation & Case Study; Non-Repudiation; Authorization & Access Control; Authentication & Time-Stamping; Certificate Validation & Revocation; Cryptographic Applications; Author Index. | |
588 | 0 | |a Print version record. | |
506 | |3 Use copy |f Restrictions unspecified |2 star |5 MiAaHDL | ||
533 | |a Electronic reproduction. |b [Place of publication not identified] : |c HathiTrust Digital Library, |d 2010. |5 MiAaHDL | ||
538 | |a Master and use copy. Digital master created according to Benchmark for Faithful Digital Reproductions of Monographs and Serials, Version 1. Digital Library Federation, December 2002. |u http://purl.oclc.org/DLF/benchrepro0212 |5 MiAaHDL | ||
583 | 1 | |a digitized |c 2010 |h HathiTrust Digital Library |l committed to preserve |2 pda |5 MiAaHDL | |
520 | |a Over the past years, Public Key Infrastructure (PKI) technology has evolved and moved from the research laboratories to the mainstream, in which many organizations are now leveraging it as part of their core infrastructure system for providing and building security in their businesses. Understanding the challenges and requirements of PKI related operations through the sharing of case studies are critical to supporting the continued research and development of PKI technologies and related systems and appliations to further progress and innovate for enhancing future development and evolution of PKI in the enterprises. This publication includes topics such as: PKI Operation & Case Study; Non-repudiation; Authorization & Access Control, Authentication & Time-tamping, Certificate Validation & Revocation and Cryptographic Applications. | ||
546 | |a English. | ||
650 | 0 | |a Public key infrastructure (Computer security) |v Congresses. | |
650 | 0 | |a Public key cryptography |v Congresses. | |
650 | 6 | |a Infrastructure à clé publique (Sécurité informatique) |v Congrès. | |
650 | 6 | |a Cryptographie à clé publique |v Congrès. | |
650 | 7 | |a COMPUTERS |x Security |x Cryptography. |2 bisacsh | |
650 | 7 | |a Public key cryptography |2 fast | |
650 | 7 | |a Public key infrastructure (Computer security) |2 fast | |
655 | 7 | |a Conference papers and proceedings |2 fast | |
700 | 1 | |a Zhou, Jianying. | |
758 | |i has work: |a Applied public key infrastructure (Text) |1 https://id.oclc.org/worldcat/entity/E39PCYBtWQbtmBJVvHd8f4tJwy |4 https://id.oclc.org/worldcat/ontology/hasWork | ||
776 | 0 | 8 | |i Print version: |a International Workshop for Applied PKI (4th : 2005 : Singapore). |t Applied public key infrastructure. |d Amsterdam ; Washington, DC : IOS Press, ©2005 |w (DLC) 2005931171 |
830 | 0 | |a Frontiers in artificial intelligence and applications ; |v v. 128. |0 http://id.loc.gov/authorities/names/n92019289 | |
856 | 4 | 0 | |l FWS01 |p ZDB-4-EBA |q FWS_PDA_EBA |u https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=163999 |3 Volltext |
936 | |a BATCHLOAD | ||
938 | |a EBL - Ebook Library |b EBLB |n EBL265956 | ||
938 | |a EBSCOhost |b EBSC |n 163999 | ||
938 | |a YBP Library Services |b YANK |n 2470902 | ||
938 | |a YBP Library Services |b YANK |n 3207153 | ||
994 | |a 92 |b GEBAY | ||
912 | |a ZDB-4-EBA | ||
049 | |a DE-863 |
Datensatz im Suchindex
DE-BY-FWS_katkey | ZDB-4-EBA-ocn228144574 |
---|---|
_version_ | 1816881666339110912 |
adam_text | |
any_adam_object | |
author2 | Zhou, Jianying |
author2_role | |
author2_variant | j z jz |
author_corporate | International Workshop for Applied PKI Singapore |
author_corporate_role | |
author_facet | Zhou, Jianying International Workshop for Applied PKI Singapore |
author_sort | International Workshop for Applied PKI Singapore |
building | Verbundindex |
bvnumber | localFWS |
callnumber-first | Q - Science |
callnumber-label | QA76 |
callnumber-raw | QA76.9.A25 I558 2005eb |
callnumber-search | QA76.9.A25 I558 2005eb |
callnumber-sort | QA 276.9 A25 I558 42005EB |
callnumber-subject | QA - Mathematics |
collection | ZDB-4-EBA |
contents | Title page; Preface; Program Committee; Contents; PKI Operation & Case Study; Non-Repudiation; Authorization & Access Control; Authentication & Time-Stamping; Certificate Validation & Revocation; Cryptographic Applications; Author Index. |
ctrlnum | (OCoLC)228144574 |
dewey-full | 005.8/2 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8/2 |
dewey-search | 005.8/2 |
dewey-sort | 15.8 12 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Electronic Conference Proceeding eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>06613cam a2200853 a 4500</leader><controlfield tag="001">ZDB-4-EBA-ocn228144574</controlfield><controlfield tag="003">OCoLC</controlfield><controlfield tag="005">20241004212047.0</controlfield><controlfield tag="006">m o d </controlfield><controlfield tag="007">cr cn|||||||||</controlfield><controlfield tag="008">050722s2005 ne a ob 101 0 eng d</controlfield><datafield tag="010" ind1=" " ind2=" "><subfield code="a"> 2005931171</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">Nz</subfield><subfield code="b">eng</subfield><subfield code="e">pn</subfield><subfield code="c">UV0</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">N$T</subfield><subfield code="d">YDXCP</subfield><subfield code="d">IOSPR</subfield><subfield code="d">OCLCE</subfield><subfield code="d">IDEBK</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">DKDLA</subfield><subfield code="d">MERUC</subfield><subfield code="d">CCO</subfield><subfield code="d">E7B</subfield><subfield code="d">MHW</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCO</subfield><subfield code="d">OCLCF</subfield><subfield code="d">OCL</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">EBLCP</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">AZK</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">LOA</subfield><subfield code="d">AGLDB</subfield><subfield code="d">MOR</subfield><subfield code="d">PIFBR</subfield><subfield code="d">ZCU</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">U3W</subfield><subfield code="d">BRL</subfield><subfield code="d">STF</subfield><subfield code="d">WRM</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">VTS</subfield><subfield code="d">ICG</subfield><subfield code="d">NRAMU</subfield><subfield code="d">EZ9</subfield><subfield code="d">MOQ</subfield><subfield code="d">INT</subfield><subfield code="d">VT2</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">WYU</subfield><subfield code="d">G3B</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">DKC</subfield><subfield code="d">CEF</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">UX1</subfield><subfield code="d">CNNOR</subfield><subfield code="d">ADU</subfield><subfield code="d">UKCRE</subfield><subfield code="d">VLY</subfield><subfield code="d">AU@</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCO</subfield><subfield code="d">M8D</subfield><subfield code="d">SFB</subfield><subfield code="d">OCLCO</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCO</subfield><subfield code="d">OCLCL</subfield></datafield><datafield tag="019" ind1=" " ind2=" "><subfield code="a">71550831</subfield><subfield code="a">148603139</subfield><subfield code="a">228144575</subfield><subfield code="a">474161474</subfield><subfield code="a">488325084</subfield><subfield code="a">491259298</subfield><subfield code="a">560230706</subfield><subfield code="a">607774945</subfield><subfield code="a">647517823</subfield><subfield code="a">657537613</subfield><subfield code="a">722472958</subfield><subfield code="a">728019579</subfield><subfield code="a">744968345</subfield><subfield code="a">814456755</subfield><subfield code="a">824550542</subfield><subfield code="a">961589593</subfield><subfield code="a">962652907</subfield><subfield code="a">965973553</subfield><subfield code="a">974201061</subfield><subfield code="a">974455834</subfield><subfield code="a">980253677</subfield><subfield code="a">988523134</subfield><subfield code="a">991584207</subfield><subfield code="a">991989982</subfield><subfield code="a">1005639747</subfield><subfield code="a">1017996862</subfield><subfield code="a">1037463753</subfield><subfield code="a">1038670811</subfield><subfield code="a">1042317824</subfield><subfield code="a">1045526033</subfield><subfield code="a">1049072403</subfield><subfield code="a">1055256959</subfield><subfield code="a">1055328336</subfield><subfield code="a">1066439470</subfield><subfield code="a">1081240052</subfield><subfield code="a">1096477179</subfield><subfield code="a">1100531499</subfield><subfield code="a">1101719070</subfield><subfield code="a">1112243845</subfield><subfield code="a">1113173644</subfield><subfield code="a">1119036959</subfield><subfield code="a">1119966136</subfield><subfield code="a">1135961701</subfield><subfield code="a">1153540117</subfield><subfield code="a">1162558192</subfield><subfield code="a">1228564236</subfield><subfield code="a">1241846695</subfield><subfield code="a">1290078431</subfield><subfield code="a">1300653318</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1423799690</subfield><subfield code="q">(electronic bk.)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781423799696</subfield><subfield code="q">(electronic bk.)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781607501367</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1607501368</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">6610505004</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1280505001</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781280505003</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9786610505005</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">6000003455</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9786000003456</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1601291175</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781601291172</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="z">1586035509</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="z">9781586035501</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)228144574</subfield><subfield code="z">(OCoLC)71550831</subfield><subfield code="z">(OCoLC)148603139</subfield><subfield code="z">(OCoLC)228144575</subfield><subfield code="z">(OCoLC)474161474</subfield><subfield code="z">(OCoLC)488325084</subfield><subfield code="z">(OCoLC)491259298</subfield><subfield code="z">(OCoLC)560230706</subfield><subfield code="z">(OCoLC)607774945</subfield><subfield code="z">(OCoLC)647517823</subfield><subfield code="z">(OCoLC)657537613</subfield><subfield code="z">(OCoLC)722472958</subfield><subfield code="z">(OCoLC)728019579</subfield><subfield code="z">(OCoLC)744968345</subfield><subfield code="z">(OCoLC)814456755</subfield><subfield code="z">(OCoLC)824550542</subfield><subfield code="z">(OCoLC)961589593</subfield><subfield code="z">(OCoLC)962652907</subfield><subfield code="z">(OCoLC)965973553</subfield><subfield code="z">(OCoLC)974201061</subfield><subfield code="z">(OCoLC)974455834</subfield><subfield code="z">(OCoLC)980253677</subfield><subfield code="z">(OCoLC)988523134</subfield><subfield code="z">(OCoLC)991584207</subfield><subfield code="z">(OCoLC)991989982</subfield><subfield code="z">(OCoLC)1005639747</subfield><subfield code="z">(OCoLC)1017996862</subfield><subfield code="z">(OCoLC)1037463753</subfield><subfield code="z">(OCoLC)1038670811</subfield><subfield code="z">(OCoLC)1042317824</subfield><subfield code="z">(OCoLC)1045526033</subfield><subfield code="z">(OCoLC)1049072403</subfield><subfield code="z">(OCoLC)1055256959</subfield><subfield code="z">(OCoLC)1055328336</subfield><subfield code="z">(OCoLC)1066439470</subfield><subfield code="z">(OCoLC)1081240052</subfield><subfield code="z">(OCoLC)1096477179</subfield><subfield code="z">(OCoLC)1100531499</subfield><subfield code="z">(OCoLC)1101719070</subfield><subfield code="z">(OCoLC)1112243845</subfield><subfield code="z">(OCoLC)1113173644</subfield><subfield code="z">(OCoLC)1119036959</subfield><subfield code="z">(OCoLC)1119966136</subfield><subfield code="z">(OCoLC)1135961701</subfield><subfield code="z">(OCoLC)1153540117</subfield><subfield code="z">(OCoLC)1162558192</subfield><subfield code="z">(OCoLC)1228564236</subfield><subfield code="z">(OCoLC)1241846695</subfield><subfield code="z">(OCoLC)1290078431</subfield><subfield code="z">(OCoLC)1300653318</subfield></datafield><datafield tag="037" ind1=" " ind2=" "><subfield code="a">978-1-58603-550-1</subfield><subfield code="b">IOS Press</subfield><subfield code="n">http://www.iospress.nl</subfield></datafield><datafield tag="042" ind1=" " ind2=" "><subfield code="a">dlr</subfield></datafield><datafield tag="050" ind1=" " ind2="4"><subfield code="a">QA76.9.A25</subfield><subfield code="b">I558 2005eb</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="x">COM004000</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">K</subfield><subfield code="2">bicssc</subfield></datafield><datafield tag="082" ind1="7" ind2=" "><subfield code="a">005.8/2</subfield><subfield code="2">22</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">MAIN</subfield></datafield><datafield tag="111" ind1="2" ind2=" "><subfield code="a">International Workshop for Applied PKI</subfield><subfield code="n">(4th :</subfield><subfield code="d">2005 :</subfield><subfield code="c">Singapore)</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Applied public key infrastructure :</subfield><subfield code="b">4th International Workshop : IWAP 2005 /</subfield><subfield code="c">edited by Jianying Zhou [and others].</subfield></datafield><datafield tag="246" ind1="3" ind2="0"><subfield code="a">IWAP 2005</subfield></datafield><datafield tag="260" ind1=" " ind2=" "><subfield code="a">Amsterdam ;</subfield><subfield code="a">Washington, DC :</subfield><subfield code="b">IOS Press,</subfield><subfield code="c">©2005.</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource (x, 265 pages) :</subfield><subfield code="b">illustrations</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">computer</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">online resource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="347" ind1=" " ind2=" "><subfield code="a">data file</subfield></datafield><datafield tag="490" ind1="1" ind2=" "><subfield code="a">Frontiers in artificial intelligence and applications ;</subfield><subfield code="v">v. 128</subfield></datafield><datafield tag="504" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references and author index.</subfield></datafield><datafield tag="505" ind1="0" ind2=" "><subfield code="a">Title page; Preface; Program Committee; Contents; PKI Operation & Case Study; Non-Repudiation; Authorization & Access Control; Authentication & Time-Stamping; Certificate Validation & Revocation; Cryptographic Applications; Author Index.</subfield></datafield><datafield tag="588" ind1="0" ind2=" "><subfield code="a">Print version record.</subfield></datafield><datafield tag="506" ind1=" " ind2=" "><subfield code="3">Use copy</subfield><subfield code="f">Restrictions unspecified</subfield><subfield code="2">star</subfield><subfield code="5">MiAaHDL</subfield></datafield><datafield tag="533" ind1=" " ind2=" "><subfield code="a">Electronic reproduction.</subfield><subfield code="b">[Place of publication not identified] :</subfield><subfield code="c">HathiTrust Digital Library,</subfield><subfield code="d">2010.</subfield><subfield code="5">MiAaHDL</subfield></datafield><datafield tag="538" ind1=" " ind2=" "><subfield code="a">Master and use copy. Digital master created according to Benchmark for Faithful Digital Reproductions of Monographs and Serials, Version 1. Digital Library Federation, December 2002.</subfield><subfield code="u">http://purl.oclc.org/DLF/benchrepro0212</subfield><subfield code="5">MiAaHDL</subfield></datafield><datafield tag="583" ind1="1" ind2=" "><subfield code="a">digitized</subfield><subfield code="c">2010</subfield><subfield code="h">HathiTrust Digital Library</subfield><subfield code="l">committed to preserve</subfield><subfield code="2">pda</subfield><subfield code="5">MiAaHDL</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Over the past years, Public Key Infrastructure (PKI) technology has evolved and moved from the research laboratories to the mainstream, in which many organizations are now leveraging it as part of their core infrastructure system for providing and building security in their businesses. Understanding the challenges and requirements of PKI related operations through the sharing of case studies are critical to supporting the continued research and development of PKI technologies and related systems and appliations to further progress and innovate for enhancing future development and evolution of PKI in the enterprises. This publication includes topics such as: PKI Operation & Case Study; Non-repudiation; Authorization & Access Control, Authentication & Time-tamping, Certificate Validation & Revocation and Cryptographic Applications.</subfield></datafield><datafield tag="546" ind1=" " ind2=" "><subfield code="a">English.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Public key infrastructure (Computer security)</subfield><subfield code="v">Congresses.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Public key cryptography</subfield><subfield code="v">Congresses.</subfield></datafield><datafield tag="650" ind1=" " ind2="6"><subfield code="a">Infrastructure à clé publique (Sécurité informatique)</subfield><subfield code="v">Congrès.</subfield></datafield><datafield tag="650" ind1=" " ind2="6"><subfield code="a">Cryptographie à clé publique</subfield><subfield code="v">Congrès.</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS</subfield><subfield code="x">Security</subfield><subfield code="x">Cryptography.</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Public key cryptography</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Public key infrastructure (Computer security)</subfield><subfield code="2">fast</subfield></datafield><datafield tag="655" ind1=" " ind2="7"><subfield code="a">Conference papers and proceedings</subfield><subfield code="2">fast</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Zhou, Jianying.</subfield></datafield><datafield tag="758" ind1=" " ind2=" "><subfield code="i">has work:</subfield><subfield code="a">Applied public key infrastructure (Text)</subfield><subfield code="1">https://id.oclc.org/worldcat/entity/E39PCYBtWQbtmBJVvHd8f4tJwy</subfield><subfield code="4">https://id.oclc.org/worldcat/ontology/hasWork</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Print version:</subfield><subfield code="a">International Workshop for Applied PKI (4th : 2005 : Singapore).</subfield><subfield code="t">Applied public key infrastructure.</subfield><subfield code="d">Amsterdam ; Washington, DC : IOS Press, ©2005</subfield><subfield code="w">(DLC) 2005931171</subfield></datafield><datafield tag="830" ind1=" " ind2="0"><subfield code="a">Frontiers in artificial intelligence and applications ;</subfield><subfield code="v">v. 128.</subfield><subfield code="0">http://id.loc.gov/authorities/names/n92019289</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="l">FWS01</subfield><subfield code="p">ZDB-4-EBA</subfield><subfield code="q">FWS_PDA_EBA</subfield><subfield code="u">https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=163999</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="936" ind1=" " ind2=" "><subfield code="a">BATCHLOAD</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">EBL - Ebook Library</subfield><subfield code="b">EBLB</subfield><subfield code="n">EBL265956</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">EBSCOhost</subfield><subfield code="b">EBSC</subfield><subfield code="n">163999</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">YBP Library Services</subfield><subfield code="b">YANK</subfield><subfield code="n">2470902</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">YBP Library Services</subfield><subfield code="b">YANK</subfield><subfield code="n">3207153</subfield></datafield><datafield tag="994" ind1=" " ind2=" "><subfield code="a">92</subfield><subfield code="b">GEBAY</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-4-EBA</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-863</subfield></datafield></record></collection> |
genre | Conference papers and proceedings fast |
genre_facet | Conference papers and proceedings |
id | ZDB-4-EBA-ocn228144574 |
illustrated | Illustrated |
indexdate | 2024-11-27T13:16:21Z |
institution | BVB |
isbn | 1423799690 9781423799696 9781607501367 1607501368 6610505004 1280505001 9781280505003 9786610505005 6000003455 9786000003456 1601291175 9781601291172 |
language | English |
lccn | 2005931171 |
oclc_num | 228144574 |
open_access_boolean | |
owner | MAIN DE-863 DE-BY-FWS |
owner_facet | MAIN DE-863 DE-BY-FWS |
physical | 1 online resource (x, 265 pages) : illustrations |
psigel | ZDB-4-EBA |
publishDate | 2005 |
publishDateSearch | 2005 |
publishDateSort | 2005 |
publisher | IOS Press, |
record_format | marc |
series | Frontiers in artificial intelligence and applications ; |
series2 | Frontiers in artificial intelligence and applications ; |
spelling | International Workshop for Applied PKI (4th : 2005 : Singapore) Applied public key infrastructure : 4th International Workshop : IWAP 2005 / edited by Jianying Zhou [and others]. IWAP 2005 Amsterdam ; Washington, DC : IOS Press, ©2005. 1 online resource (x, 265 pages) : illustrations text txt rdacontent computer c rdamedia online resource cr rdacarrier data file Frontiers in artificial intelligence and applications ; v. 128 Includes bibliographical references and author index. Title page; Preface; Program Committee; Contents; PKI Operation & Case Study; Non-Repudiation; Authorization & Access Control; Authentication & Time-Stamping; Certificate Validation & Revocation; Cryptographic Applications; Author Index. Print version record. Use copy Restrictions unspecified star MiAaHDL Electronic reproduction. [Place of publication not identified] : HathiTrust Digital Library, 2010. MiAaHDL Master and use copy. Digital master created according to Benchmark for Faithful Digital Reproductions of Monographs and Serials, Version 1. Digital Library Federation, December 2002. http://purl.oclc.org/DLF/benchrepro0212 MiAaHDL digitized 2010 HathiTrust Digital Library committed to preserve pda MiAaHDL Over the past years, Public Key Infrastructure (PKI) technology has evolved and moved from the research laboratories to the mainstream, in which many organizations are now leveraging it as part of their core infrastructure system for providing and building security in their businesses. Understanding the challenges and requirements of PKI related operations through the sharing of case studies are critical to supporting the continued research and development of PKI technologies and related systems and appliations to further progress and innovate for enhancing future development and evolution of PKI in the enterprises. This publication includes topics such as: PKI Operation & Case Study; Non-repudiation; Authorization & Access Control, Authentication & Time-tamping, Certificate Validation & Revocation and Cryptographic Applications. English. Public key infrastructure (Computer security) Congresses. Public key cryptography Congresses. Infrastructure à clé publique (Sécurité informatique) Congrès. Cryptographie à clé publique Congrès. COMPUTERS Security Cryptography. bisacsh Public key cryptography fast Public key infrastructure (Computer security) fast Conference papers and proceedings fast Zhou, Jianying. has work: Applied public key infrastructure (Text) https://id.oclc.org/worldcat/entity/E39PCYBtWQbtmBJVvHd8f4tJwy https://id.oclc.org/worldcat/ontology/hasWork Print version: International Workshop for Applied PKI (4th : 2005 : Singapore). Applied public key infrastructure. Amsterdam ; Washington, DC : IOS Press, ©2005 (DLC) 2005931171 Frontiers in artificial intelligence and applications ; v. 128. http://id.loc.gov/authorities/names/n92019289 FWS01 ZDB-4-EBA FWS_PDA_EBA https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=163999 Volltext |
spellingShingle | Applied public key infrastructure : 4th International Workshop : IWAP 2005 / Frontiers in artificial intelligence and applications ; Title page; Preface; Program Committee; Contents; PKI Operation & Case Study; Non-Repudiation; Authorization & Access Control; Authentication & Time-Stamping; Certificate Validation & Revocation; Cryptographic Applications; Author Index. Public key infrastructure (Computer security) Congresses. Public key cryptography Congresses. Infrastructure à clé publique (Sécurité informatique) Congrès. Cryptographie à clé publique Congrès. COMPUTERS Security Cryptography. bisacsh Public key cryptography fast Public key infrastructure (Computer security) fast |
title | Applied public key infrastructure : 4th International Workshop : IWAP 2005 / |
title_alt | IWAP 2005 |
title_auth | Applied public key infrastructure : 4th International Workshop : IWAP 2005 / |
title_exact_search | Applied public key infrastructure : 4th International Workshop : IWAP 2005 / |
title_full | Applied public key infrastructure : 4th International Workshop : IWAP 2005 / edited by Jianying Zhou [and others]. |
title_fullStr | Applied public key infrastructure : 4th International Workshop : IWAP 2005 / edited by Jianying Zhou [and others]. |
title_full_unstemmed | Applied public key infrastructure : 4th International Workshop : IWAP 2005 / edited by Jianying Zhou [and others]. |
title_short | Applied public key infrastructure : |
title_sort | applied public key infrastructure 4th international workshop iwap 2005 |
title_sub | 4th International Workshop : IWAP 2005 / |
topic | Public key infrastructure (Computer security) Congresses. Public key cryptography Congresses. Infrastructure à clé publique (Sécurité informatique) Congrès. Cryptographie à clé publique Congrès. COMPUTERS Security Cryptography. bisacsh Public key cryptography fast Public key infrastructure (Computer security) fast |
topic_facet | Public key infrastructure (Computer security) Congresses. Public key cryptography Congresses. Infrastructure à clé publique (Sécurité informatique) Congrès. Cryptographie à clé publique Congrès. COMPUTERS Security Cryptography. Public key cryptography Public key infrastructure (Computer security) Conference papers and proceedings |
url | https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=163999 |
work_keys_str_mv | AT internationalworkshopforappliedpkisingapore appliedpublickeyinfrastructure4thinternationalworkshopiwap2005 AT zhoujianying appliedpublickeyinfrastructure4thinternationalworkshopiwap2005 AT internationalworkshopforappliedpkisingapore iwap2005 AT zhoujianying iwap2005 |