Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 225,478,613 papers from all fields of science
Search
Sign In
Create Free Account
Authorization certificate
Known as:
AC
, Attribute certificate
, Certificate
In computer security, an attribute certificate, or authorization certificate (AC) is a digital document containing attributes associated to the…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
18 relations
Access control list
Capability-based security
Certificate authority
Computer security
Expand
Broader (1)
Public-key cryptography
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2008
2008
Service Discovery and Delivery System Based on Trust in Mobile Ad-Hoc Network
Insung Han
,
Jin-Mook Kim
,
Hwangbin Ryou
,
W. Ahn
International Conferences on Information Science…
2008
Corpus ID: 8078583
Traditional service discovery protocols cannot be applied directly to mobile ad hoc networks because of their heterogeneity and…
Expand
2006
2006
Anonymous attribute certificates based on traceable signatures
V. Benjumea
,
Javier López
,
J. M. Troya
Internet Research
2006
Corpus ID: 16553853
Purpose – To provide a cryptographic protocol for anonymously accessing services offered on the web. Such anonymous accesses can…
Expand
2005
2005
Role-based privilege and trust management
Dongwan Shin
,
Gail-Joon Ahn
Computer systems science and engineering
2005
Corpus ID: 12290829
The Internet provides tremendous connectivity and information sharing capability which organizations can use for their…
Expand
2005
2005
Attribute certificate
P. Landrock
Encyclopedia of Cryptography and Security
2005
Corpus ID: 1218524
2004
2004
DHCP Authentication Using Certificates
J. Demerjian
,
A. Serhrouchni
IFIP International Information Security…
2004
Corpus ID: 31042946
In this paper, we describe several methods of DHCP authentication. We propose an extension to DHCP protocol in order to allow a…
Expand
Review
2003
Review
2003
The X.509 Privilege Management Infrastructure
D. Chadwick
2003
Corpus ID: 60950002
This paper provides an overview of the Privilege Management Infrastructure (PMI) introduced in the 2000 edition of X.509. It…
Expand
Review
2003
Review
2003
Integrated security services for dynamic coalitions
H. Khurana
,
S. Gavrila
,
+5 authors
J. Baras
Proceedings DARPA Information Survivability…
2003
Corpus ID: 15949589
Coalitions are collaborative networks of autonomous domains where resource sharing is achieved by the distribution of access…
Expand
2003
2003
FlexiCert: merging X.509 identity certificates and attribute certificates
A. Lakshminarayanan
,
Jianying Zhou
14th International Workshop on Database and…
2003
Corpus ID: 34775303
In the last few years, X.509 based identity certificates are routinely used in the Internet. Another class of certificates, the…
Expand
2000
2000
Access control with role attribute certificates
Jing-Jang Hwang
,
Kou-Chen Wu
,
Duen-Ren Liu
2000
Corpus ID: 62724541
Highly Cited
1998
Highly Cited
1998
Authorization and attribute certificates for widely distributed access control
W. Johnston
,
Srilekha Mudumbai
,
M. Thompson
Proceedings Seventh IEEE International Workshop…
1998
Corpus ID: 42065095
The authors describe a system whose purpose is to explore the use of certificates for the distributed management of access rights…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE