Matches in DBpedia 2016-04 for { <http://wikidata.dbpedia.org/resource/Q5157345> ?p ?o }
Showing triples 1 to 38 of
38
with 100 triples per page.
- Q5157345 subject Q7001437.
- Q5157345 subject Q7462967.
- Q5157345 subject Q7483163.
- Q5157345 abstract "In information security, computational trust is the generation of trusted authorities or user trust through cryptography. In centralised systems, security is typically based on the authenticated identity of external parties. Rigid authentication mechanisms, such as Public Key Infrastructures (PKIs) or Kerberos have allowed this model to be extended to distributed systems within a few closely collaborating domains or within a single administrative domain. During recent years, computer science has moved from centralised systems to distributed computing. This evolution has several implications for security models, policies and mechanisms needed to protect users’ information and resources in an increasingly interconnected computing infrastructure.Identity-based security mechanisms cannot authorise an operation without authenticating the claiming entity. This means that no interaction can occur unless both parties are known by their authentication frameworks. Spontaneous interactions would, therefore, require a single, or a few trusted certificate authorities (CAs). In the present context, PKI has not been considered since they have issues, thus it is unlikely that they will establish themselves as a reference standard in the near future. A user who wishes to collaborate with another party can choose between enabling security and thereby disabling spontaneous collaboration, or disabling security and enabling spontaneous collaboration. It is fundamental that mobile users and devices can authenticate in an autonomous way without relying on a common authentication infrastructure. In order to face this problem, we need to examine the challenges introduced by "global computing", a term coined by the EU for the future of the global information society, and to identify their impact on security.".
- Q5157345 wikiPageExternalLink trmsim-wsn.
- Q5157345 wikiPageWikiLink Q1114582.
- Q5157345 wikiPageWikiLink Q11660.
- Q5157345 wikiPageWikiLink Q166142.
- Q5157345 wikiPageWikiLink Q179742.
- Q5157345 wikiPageWikiLink Q180634.
- Q5157345 wikiPageWikiLink Q189900.
- Q5157345 wikiPageWikiLink Q196776.
- Q5157345 wikiPageWikiLink Q210980.
- Q5157345 wikiPageWikiLink Q21201.
- Q5157345 wikiPageWikiLink Q212108.
- Q5157345 wikiPageWikiLink Q2200417.
- Q5157345 wikiPageWikiLink Q2715623.
- Q5157345 wikiPageWikiLink Q2892532.
- Q5157345 wikiPageWikiLink Q36442.
- Q5157345 wikiPageWikiLink Q44455.
- Q5157345 wikiPageWikiLink Q458.
- Q5157345 wikiPageWikiLink Q4830453.
- Q5157345 wikiPageWikiLink Q484847.
- Q5157345 wikiPageWikiLink Q506053.
- Q5157345 wikiPageWikiLink Q529909.
- Q5157345 wikiPageWikiLink Q5975208.
- Q5157345 wikiPageWikiLink Q658476.
- Q5157345 wikiPageWikiLink Q659974.
- Q5157345 wikiPageWikiLink Q7001437.
- Q5157345 wikiPageWikiLink Q742736.
- Q5157345 wikiPageWikiLink Q7462967.
- Q5157345 wikiPageWikiLink Q7483163.
- Q5157345 wikiPageWikiLink Q7848173.
- Q5157345 wikiPageWikiLink Q788590.
- Q5157345 wikiPageWikiLink Q8789.
- Q5157345 wikiPageWikiLink Q9418.
- Q5157345 comment "In information security, computational trust is the generation of trusted authorities or user trust through cryptography. In centralised systems, security is typically based on the authenticated identity of external parties. Rigid authentication mechanisms, such as Public Key Infrastructures (PKIs) or Kerberos have allowed this model to be extended to distributed systems within a few closely collaborating domains or within a single administrative domain.".
- Q5157345 label "Computational trust".