Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 228,397,760 papers from all fields of science
Search
Sign In
Create Free Account
Simple public-key infrastructure
Known as:
SDSI
, SPKI
, Simple Public Key Infrastructure
Simple public key infrastructure (SPKI, pronounced spoo-key) was born out of a joint effort to overcome the overcomplication and scalability problems…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
7 relations
Certificate authority
E-speak
Public key infrastructure
S-expression
Expand
Broader (1)
Key management
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2015
2015
Testing software defined and cognitive radios using software defined synthetic instruments
D. Carey
,
R. W. Lowdermilk
,
Michael Spinali
IEEE Instrumentation & Measurement Magazine
2015
Corpus ID: 8894629
Software Defined Radios (SDRs) are wireless communication systems in which many of the radios' important functional elements…
Expand
2008
2008
SDSIrep: A Reputation System Based on SDSI
A. Bouajjani
,
J. Esparza
,
Stefan Schwoon
,
Dejvuth Suwimonteerabuth
International Conference on Tools and Algorithms…
2008
Corpus ID: 11273584
We introduce SDSIrep, a reputation system based on the SPKI/SDSI authorization system. It is well-known that a system of SPKI…
Expand
2006
2006
CASTmiddleware: Security Middleware of Context-Awareness Simulation Toolkit for Ubiquitous Computing Research Environment
InSu Kim
,
YoungLok Lee
,
Hyung-Hyo Lee
2006
Corpus ID: 57904044
The study deals with the most important elements of ubiquitous computing, that is, the toolkit to acquire, express and safely use…
Expand
2004
2004
Pride: peer-to-peer reputation infrastructure for decentralized environments
Prashant Dewan
,
P. Dasgupta
WWW Alt. '04
2004
Corpus ID: 13113559
Peer-to-peer (P2P) networks use the fundamental assumption that the nodes in the network will cooperate and will not cheat. In…
Expand
2004
2004
Design and Development of an M-Commerce Environment: The E-CWE Project
Z. Maamar
,
H. Yahyaoui
,
Wathiq Mansoor
Journal of Organizational Computing and…
2004
Corpus ID: 6624719
We discuss the use of software agents in the design and development of an m-commerce environment. Software agents are considered…
Expand
2002
2002
RTML: A Role-based Trust-management Markup Language
Ninghui Li
,
John C. Mitchell
,
Yuane Qiu
2002
Corpus ID: 6156800
RT is a framework for Role-based Trust Management [20]. In comparison with systems like SPKI/SDSI and KeyNote, the advantages of…
Expand
2002
2002
Distributed Access Control Using SPKI Delegation Certificates
Chen Kang-sheng
2002
Corpus ID: 63926605
Traditional access control technologies can not meet the security requirement of large scale distributed application. Based on…
Expand
Review
2000
Review
2000
Review and Revocation of Access Privileges Distributed with PKI Certificates
H. Khurana
,
V. Gligor
Security Protocols Workshop
2000
Corpus ID: 39809616
Public-key infrastructures (PKIs) that support both identity certificates and access control (e.g., attribute, delegation…
Expand
2000
2000
Extending Jini with decentralized trust management
P. Eronen
,
Johannes Lehtinen
,
Jukka Zitting
,
P. Nikander
2000
Corpus ID: 18371478
Decentralized Trust Management, originally introduced by the PolicyMaker and SDSI prototypes, and currently promoted at least by…
Expand
2000
2000
A Revocation, Validation and Authentication Protocol for SPKI Based Delegation Systems
Yki Kortesniemi
,
Tero Hasu
,
Jonna Särs
Network and Distributed System Security Symposium
2000
Corpus ID: 955988
A method of applying and securing mirror mounts to the inboard surfaces of windshields. The method includes using means for…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE