Skip to main content
Article thumbnail
Location of Repository

Identifying diferent scenarios for group access control in distributed environments

By Joan Arnedo Moreno and Jordi Herrera Joancomartí

Abstract

Open Access Documen

Topics: Group access control, Distributed systems
Publisher: DEIC UAB - EIMT UOC
Year: 2006
OAI identifier: oai:openaccess.uoc.edu:10609/8744

Suggested articles

Citations

  1. (2003). Authentication and access control in p2p network. doi
  2. (2005). Byzantine fault tolerant public key authentication in peerto-peer systems. doi
  3. (1988). CCITT: The directory authentication framework. recommendation doi
  4. (2002). Coca: A secure distributed online certification authority. doi
  5. (2001). Efficient generation of shared rsa keys. doi
  6. (1996). Handbook of Applied Cryptography. doi
  7. (2003). J.P.: Self-organized public-key management for mobile ad hoc networks. doi
  8. (2000). Key Agreement in Dynamic Peer Groups. In: doi
  9. (2004). Models of authentications in ad hoc networks and their related network properties. doi
  10. Pgp: Pretty good privacy. (O’Reilly and Associates Inc.) doi
  11. (1997). Proactive public key and signature systems. In: doi
  12. (2001). Providing robust and ubiquitous security support for mobile ad hoc networks. In: doi
  13. (1998). Robust efficient distributed rsa-key generation. In: doi
  14. (2002). S.: Towards a survivable security architecture for ad-hoc networks. doi
  15. (1999). Securing ad hoc networks. doi
  16. (1997). Split knowledge generation of rsa parameters. In: doi
  17. (1982). The byzantine generals problem. doi
  18. (2001). The quest for security in mobile ad hoc networks. In: doi
  19. (1989). Threshold cryptosystems. In: doi

To submit an update or takedown request for this paper, please submit an Update/Correction/Removal Request.