Skip to search formSkip to main contentSkip to account menu

Authorization certificate

Known as: AC, Attribute certificate, Certificate 
In computer security, an attribute certificate, or authorization certificate (AC) is a digital document containing attributes associated to the… 
Wikipedia (opens in a new tab)

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2008
2008
Traditional service discovery protocols cannot be applied directly to mobile ad hoc networks because of their heterogeneity and… 
2006
2006
Purpose – To provide a cryptographic protocol for anonymously accessing services offered on the web. Such anonymous accesses can… 
2005
2005
The Internet provides tremendous connectivity and information sharing capability which organizations can use for their… 
2005
2005
  • P. Landrock
  • 2005
  • Corpus ID: 1218524
2004
2004
In this paper, we describe several methods of DHCP authentication. We propose an extension to DHCP protocol in order to allow a… 
Review
2003
Review
2003
This paper provides an overview of the Privilege Management Infrastructure (PMI) introduced in the 2000 edition of X.509. It… 
Review
2003
Review
2003
Coalitions are collaborative networks of autonomous domains where resource sharing is achieved by the distribution of access… 
2003
2003
In the last few years, X.509 based identity certificates are routinely used in the Internet. Another class of certificates, the… 
Highly Cited
1998
Highly Cited
1998
The authors describe a system whose purpose is to explore the use of certificates for the distributed management of access rights…