Privilege Management Infrastructure

Known as: PMI, Privilege Management 
Privilege Management is the process of managing user authorisations based on the ITU-T Recommendation X.509. The 2001 edition of X.509 specifies most… (More)
Wikipedia

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
Review
2009
Review
2009
This paper is focused on the management of virtual organizations (VO) inside healthcare environments where grid technology is… (More)
  • table I
  • figure 1
  • figure 3
  • figure 2
  • figure 4
Is this relevant?
2006
2006
Simplifying access to and usage of large scale compute resources via the grid is of critical importance to encourage the uptake… (More)
  • figure 1
  • figure 2
  • figure 3
Is this relevant?
2006
2006
Privilege Management Infrastructures (PMI) are emergin g as a necessary alternative to authorization through Access Control Lists… (More)
  • figure 1
  • figure 2
  • figure 3
Is this relevant?
2006
2006
OBJECTIVES For establishing trustworthiness in advanced architectures for future-proof health information systems being open… (More)
  • table 1
  • figure 1
  • figure 2
  • table 2
  • figure 3
Is this relevant?
2005
2005
In the computerized organizations, the public key infrastructure (PKI) certifications enforce authentication services providing… (More)
  • figure 1
  • figure 2
Is this relevant?
Review
2003
Review
2003
This paper provides an overview of the Privilege Management Infrastructure (PMI) introduced in the 2000 edition of X.509. It… (More)
  • table 1
  • figure 1
Is this relevant?
2003
2003
M-commerce have grown rapidly, it is very important to determine whether an identity is permitted to access a resource in mobile… (More)
  • figure 1
  • figure 2
  • table 1
  • figure 3
  • figure 4
Is this relevant?
Highly Cited
2003
Highly Cited
2003
Many grid usage scenarios depend on small, dynamic working groups for which the ability to establish transient collaboration with… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 5
  • figure 4
Is this relevant?
Highly Cited
2002
Highly Cited
2002
This paper describes the output of the PERMIS project, which has developed a role based access control infrastructure that uses X… (More)
  • figure 1
  • table 1
  • table 2
  • figure 3
  • figure 4
Is this relevant?
2001
2001
David W Chadwick is a Professor of Information Systems Security at the University of Salford. He has published widely on the… (More)
  • table 1
  • figure 1
  • table 2
Is this relevant?