共 50 条
- [41] SciTokens SSH: Token-based Authentication for Remote Login to Scientific Computing Environments [J]. PRACTICE AND EXPERIENCE IN ADVANCED RESEARCH COMPUTING 2020, PEARC 2020, 2020, : 465 - 468
- [43] NeoMAN: Negotiation Management Method for IKE Protocol based on X.509 [J]. ALPIT 2008: SEVENTH INTERNATIONAL CONFERENCE ON ADVANCED LANGUAGE PROCESSING AND WEB INFORMATION TECHNOLOGY, PROCEEDINGS, 2008, : 335 - 340
- [44] An X.509 Based Licensed Digital Signature Framework for Hierarchical Organizations [J]. RECENT TRENDS IN WIRELESS AND MOBILE NETWORKS, 2010, 84 : 398 - 408
- [45] Machine Learning-Based Malicious X.509 Certificates' Detection [J]. APPLIED SCIENCES-BASEL, 2021, 11 (05): : 1 - 24
- [46] Using X.509 attribute certificates for role-based EAM [J]. RESEARCH DIRECTIONS IN DATA AND APPLICATIONS SECURITY, 2003, 128 : 49 - 60
- [47] A JSON']JSON Token-Based Authentication and Access Management Schema for Cloud SaaS Applications [J]. 2017 IEEE 5TH INTERNATIONAL CONFERENCE ON FUTURE INTERNET OF THINGS AND CLOUD (FICLOUD 2017), 2017, : 47 - 53
- [48] Exploiting X.509 certificate and multi-agent system architecture for role-based access control and authentication management [J]. 2007 CIT: 7TH IEEE INTERNATIONAL CONFERENCE ON COMPUTER AND INFORMATION TECHNOLOGY, PROCEEDINGS, 2007, : 733 - +
- [49] Token-based authentication and access delegation for HW-accelerated telco cloud solution [J]. PROCEEDINGS OF THE 2022 IEEE 11TH INTERNATIONAL CONFERENCE ON CLOUD NETWORKING (IEEE CLOUDNET 2022), 2022, : 109 - 117
- [50] Security vulnerabilities assessment of the X.509 protocol by syntax-based testing [J]. MILCOM 2004 - 2004 IEEE MILITARY COMMUNICATIONS CONFERENCE, VOLS 1- 3, 2004, : 1572 - 1578