Skip to search formSkip to main content
You are currently offline. Some features of the site may not work correctly.

Privilege Management Infrastructure

Known as: PMI, Privilege Management 
Privilege Management is the process of managing user authorisations based on the ITU-T Recommendation X.509. The 2001 edition of X.509 specifies most… Expand
Wikipedia

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2018
2018
Abstract Rooting an Android device can be a voluntary behavior from end users with various motivations, such as removing OEM pre… Expand
Is this relevant?
Highly Cited
2012
Highly Cited
2012
The widely popular browser extensions now become one of the most commonly used malware attack vectors. The Google Chrome browser… Expand
  • figure 1
  • table 1
  • figure 2
  • figure 3
  • table 2
Is this relevant?
2004
2004
This paper describes a RBAC privilege management infrastructure which uses X.509 attribute certificates to store the users roles… Expand
Is this relevant?
Highly Cited
2003
Highly Cited
2003
This paper describes the ECPERMIS project, which has developed a role based access control infrastructure that uses X.509… Expand
Is this relevant?
Review
2003
Review
2003
This paper provides an overview of the Privilege Management Infrastructure (PMI) introduced in the 2000 edition of X.509. It… Expand
  • table 1
  • figure 1
Is this relevant?
2003
2003
Within the European HARP project, the HARP Cross Security Platform (HCSP) has been specified to design and to implement… Expand
  • figure 1
  • figure 2
  • figure 5
  • figure 6
  • figure 7
Is this relevant?
2003
2003
M-commerce have grown rapidly, it is very important to determine whether an identity is permitted to access a resource in mobile… Expand
  • figure 1
  • figure 2
  • table 1
  • figure 3
  • figure 4
Is this relevant?
Highly Cited
2002
Highly Cited
2002
This paper describes the output of the PERMIS project, which has developed a role based access control infrastructure that uses X… Expand
  • figure 1
  • table 1
  • table 2
  • figure 3
  • figure 4
Is this relevant?
Highly Cited
2002
Highly Cited
2002
This paper describes a role based access control policy template for use by privilege management infrastructures where the roles… Expand
  • table 1
  • figure 1
Is this relevant?
Highly Cited
1994
Highly Cited
1994
This paper examines the concept of role-based protection and, in particular, role organization. From basic role relationships, a… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?