University of Hertfordshire

By the same authors

Binding bit patterns to real world entities

Research output: Book/ReportOther report

Standard

Binding bit patterns to real world entities. / Christianson, B.; Malcolm, J.

University of Hertfordshire, 1997. (UH Computer Science technical Report; Vol. 306).

Research output: Book/ReportOther report

Harvard

Christianson, B & Malcolm, J 1997, Binding bit patterns to real world entities. UH Computer Science technical Report, vol. 306, University of Hertfordshire.

APA

Christianson, B., & Malcolm, J. (1997). Binding bit patterns to real world entities. (UH Computer Science technical Report; Vol. 306). University of Hertfordshire.

Vancouver

Christianson B, Malcolm J. Binding bit patterns to real world entities. University of Hertfordshire, 1997. (UH Computer Science technical Report).

Author

Christianson, B. ; Malcolm, J. / Binding bit patterns to real world entities. University of Hertfordshire, 1997. (UH Computer Science technical Report).

Bibtex

@book{449a10f05bb74e3aaedce162bd27f6c2,
title = "Binding bit patterns to real world entities",
abstract = "Public key cryptography is often used to verify the integrity of a piece of data, or more generally to ensure that operations which modify the data have been requested and carried out by principles who are authorized to do so. This requires keys to be bound to principles in an unforgeably verifiable manner. Cryptographic bit patterns such as electronic key certificates (EKCs) have a part to play in establishing such bindings, but the requirement ultimately to bind keys to real world entities imposes subtle constraints upon the structure and semantics of EKCs and related entities such as ACLs and capabilities, and upon the role which such entities may play in access control and integrity verification. These do not appear to be adequately realized at present.",
author = "B. Christianson and J. Malcolm",
year = "1997",
language = "English",
series = "UH Computer Science technical Report",
publisher = "University of Hertfordshire",

}

RIS

TY - BOOK

T1 - Binding bit patterns to real world entities

AU - Christianson, B.

AU - Malcolm, J.

PY - 1997

Y1 - 1997

N2 - Public key cryptography is often used to verify the integrity of a piece of data, or more generally to ensure that operations which modify the data have been requested and carried out by principles who are authorized to do so. This requires keys to be bound to principles in an unforgeably verifiable manner. Cryptographic bit patterns such as electronic key certificates (EKCs) have a part to play in establishing such bindings, but the requirement ultimately to bind keys to real world entities imposes subtle constraints upon the structure and semantics of EKCs and related entities such as ACLs and capabilities, and upon the role which such entities may play in access control and integrity verification. These do not appear to be adequately realized at present.

AB - Public key cryptography is often used to verify the integrity of a piece of data, or more generally to ensure that operations which modify the data have been requested and carried out by principles who are authorized to do so. This requires keys to be bound to principles in an unforgeably verifiable manner. Cryptographic bit patterns such as electronic key certificates (EKCs) have a part to play in establishing such bindings, but the requirement ultimately to bind keys to real world entities imposes subtle constraints upon the structure and semantics of EKCs and related entities such as ACLs and capabilities, and upon the role which such entities may play in access control and integrity verification. These do not appear to be adequately realized at present.

M3 - Other report

T3 - UH Computer Science technical Report

BT - Binding bit patterns to real world entities

PB - University of Hertfordshire

ER -