Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 230,852,604 papers from all fields of science
Search
Sign In
Create Free Account
Simple public-key infrastructure
Known as:
SDSI
, SPKI
, Simple Public Key Infrastructure
Simple public key infrastructure (SPKI, pronounced spoo-key) was born out of a joint effort to overcome the overcomplication and scalability problems…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
7 relations
Certificate authority
E-speak
Public key infrastructure
S-expression
Expand
Broader (1)
Key management
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2010
2010
An effective access control mechanism in home network environment based on SPKI certificates
Bin Song
,
InKwan Yu
,
Jiseong Son
,
D. Baik
IEEE International Conference on Information…
2010
Corpus ID: 14066932
In home network environment, security is one of the most important issues that need to be addressed because the services provided…
Expand
2008
2008
SDSIrep: A Reputation System Based on SDSI
A. Bouajjani
,
J. Esparza
,
Stefan Schwoon
,
Dejvuth Suwimonteerabuth
International Conference on Tools and Algorithms…
2008
Corpus ID: 11273584
We introduce SDSIrep, a reputation system based on the SPKI/SDSI authorization system. It is well-known that a system of SPKI…
Expand
2007
2007
A Comparative Study of SPKI/SDSI and K-SPKI/SDSI Systems
V. Vasudevan
,
N. Sivaraman
,
S. Senthil Kumar
,
R. Muthuraj
,
J. Indumathi
,
G.V. Uma
2007
Corpus ID: 62648447
2006
2006
CASTmiddleware: Security Middleware of Context-Awareness Simulation Toolkit for Ubiquitous Computing Research Environment
InSu Kim
,
YoungLok Lee
,
Hyung-Hyo Lee
2006
Corpus ID: 57904044
The study deals with the most important elements of ubiquitous computing, that is, the toolkit to acquire, express and safely use…
Expand
2004
2004
Pride: peer-to-peer reputation infrastructure for decentralized environments
Prashant Dewan
,
P. Dasgupta
WWW Alt. '04
2004
Corpus ID: 13113559
Peer-to-peer (P2P) networks use the fundamental assumption that the nodes in the network will cooperate and will not cheat. In…
Expand
2002
2002
RTML: A Role-based Trust-management Markup Language
Ninghui Li
,
John C. Mitchell
,
Yuane Qiu
2002
Corpus ID: 6156800
RT is a framework for Role-based Trust Management [20]. In comparison with systems like SPKI/SDSI and KeyNote, the advantages of…
Expand
2002
2002
Distributed Access Control Using SPKI Delegation Certificates
Chen Kang-sheng
2002
Corpus ID: 63926605
Traditional access control technologies can not meet the security requirement of large scale distributed application. Based on…
Expand
2002
2002
A note on SPKI's authorisation syntax
Olav L. Bandmann
,
M. Dam
2002
Corpus ID: 5772005
Tuple reduction is the basic mechanism used in SPKI to make authorisation decisions. A basic problem with the SPKI authorisation…
Expand
Review
2000
Review
2000
Review and Revocation of Access Privileges Distributed with PKI Certificates
H. Khurana
,
V. Gligor
Security Protocols Workshop
2000
Corpus ID: 39809616
Public-key infrastructures (PKIs) that support both identity certificates and access control (e.g., attribute, delegation…
Expand
2000
2000
A Revocation, Validation and Authentication Protocol for SPKI Based Delegation Systems
Yki Kortesniemi
,
Tero Hasu
,
Jonna Särs
Network and Distributed System Security Symposium
2000
Corpus ID: 955988
A method of applying and securing mirror mounts to the inboard surfaces of windshields. The method includes using means for…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE