Search for dissertations about: "Revocation"
Showing result 1 - 5 of 8 swedish dissertations containing the word Revocation.
-
1. Understanding Certificate Revocation
Abstract : Correct certificate revocation practices are essential to each public-key infrastructure. While there exist a number of protocols to achieve revocation in PKI systems, there has been very little work on the theory behind it: Which different types of revocation can be identified? What is the intended effect of a specific revocation type to the knowledge base of each entity?As a first step towards a methodology for the development of reliable models, we present a graph-based formalism for specification and reasoning about the distribution and revocation of public keys and certificates. READ MORE
-
2. An Economic Analysis of Regulation by Conditional Permits
Abstract : Syftet med denna avhandling är att öka kunskapen om varför villkorade tillstånd inte leder till att en lag fullt ut implementeras.Den lagstiftning som reglerar industriella verksamheter innehåller ofta generella principer. Dessa ska vägleda myndigheten i attbalansera verksamhetens nytta mot eventuella negativa effekter. READ MORE
-
3. The Key to Intelligent Transportation Systems: Identity and Credential Management for Secure and Privacy-Preserving Vehicular Communication Systems
Abstract : Vehicular Communication (VC) systems can greatly enhance road safety and transportation efficiency and enable a variety of applications providing traffic efficiency, environmental hazards, road conditions and infotainment. Vehicles are equipped with sensors and radars to sense their surroundings and external environment, as well as with an internal Controller Area Network (CAN) bus. READ MORE
-
4. Public Key Infrastructure and its applications for resource-constrained IoT
Abstract : The Internet of Things (IoT) is rapidly expanding and IoT devices are being deployed in security-critical scenarios, such as in critical infrastructure monitoring and within e-health, and privacy-sensitive applications in hospitals and homes. With this, questions of security and safety become paramount. READ MORE
-
5. Decentralised Privilege Management for Access Control
Abstract : The Internet and the more recent technologies such as web services, grid computing, utility computing and peer-to-peer computing have created possibilities for very dynamic collaborations and business transactions where information and computational resources may be accessed and shared among autonomous and administratively independent organisations. In these types of collaborations, there is no single authority who can define access policies for all the shared resources. READ MORE