Skip to main content
  • Conference proceedings
  • © 2005

Public Key Infrastructure

Second European PKI Workshop: Research and Applications, EuroPKI 2005, Canterbury, UK, June 30- July 1, 2005, Revised Selected Papers

Part of the book series: Lecture Notes in Computer Science (LNCS, volume 3545)

Part of the book sub series: Security and Cryptology (LNSC)

Conference series link(s): EuroPKI: European Public Key Infrastructure Workshop

Conference proceedings info: EuroPKI 2005.

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access

This is a preview of subscription content, log in via an institution to check for access.

Table of contents (18 papers)

  1. Front Matter

  2. Authorisation

    1. A Multipurpose Delegation Proxy for WWW Credentials

      • Tobias Straub, Thilo-Alexander Ginkel, Johannes Buchmann
      Pages 1-21
    2. Secure Role Activation and Authorization in the Enterprise Environment

      • Richard W. C. Lui, Lucas C. K. Hui, S. M. Yiu
      Pages 22-35
  3. Interoperability

    1. A Heterogeneous Network Access Service Based on PERMIS and SAML

      • Gabriel López, Óscar Cánovas, Antonio F. Gómez-Skarmeta, Sassa Otenko, David W. Chadwick
      Pages 55-72
    2. XKMS Working Group Interoperability Status Report

      • Guillermo Álvaro, Stephen Farrell, Tommy Lindberg, Roland Lockhart, Yunhao Zhang
      Pages 86-99
  4. Evaluating a CA

    1. An Innovative Policy-Based Cross Certification Methodology for Public Key Infrastructures

      • Valentina Casola, Antonino Mazzeo, Nicola Mazzocca, Massimiliano Rak
      Pages 100-117
    2. Modeling Public Key Infrastructures in the Real World

      • John Marchesini, Sean Smith
      Pages 118-134
    3. Classifying Public Key Certificates

      • Javier Lopez, Rolf Oppliger, Günther Pernul
      Pages 135-143
  5. ID Based Ring Signatures

    1. Identity Based Ring Signature: Why, How and What Next

      • Sherman S. M. Chow, Richard W. C. Lui, Lucas C. K. Hui, S. M. Yiu
      Pages 144-161
  6. Practical Implementations

    1. Development of a Flexible PERMIS Authorisation Module for Shibboleth and Apache Server

      • Wensheng Xu, David W. Chadwick, Sassa Otenko
      Pages 162-179
    2. CA-in-a-Box

      • Mark Franklin, Kevin Mitcham, Sean Smith, Joshua Stabiner, Omen Wild
      Pages 180-190
  7. New Protocols

    1. A Lower-Bound of Complexity for RSA-Based Password-Authenticated Key Exchange

      • SeongHan Shin, Kazukuni Kobara, Hideki Imai
      Pages 191-205
    2. Recoverable and Untraceable E-Cash

      • Joseph K. Liu, Patrick P. Tsang, Duncan S. Wong
      Pages 206-214
  8. Risks and Attacks

    1. A Method for Detecting the Exposure of OCSP Responder’s Session Private Key in D-OCSP-KIS

      • Younggyo Lee, Injung Kim, Seungjoo Kim, Dongho Won
      Pages 215-226
    2. Installing Fake Root Keys in a PC

      • Adil Alsaid, Chris J. Mitchell
      Pages 227-239
  9. Long Term Archiving

  10. Back Matter

Other Volumes

  1. Public Key Infrastructure

About this book

This book contains the proceedings of the 2nd EuroPKI Workshop — EuroPKI 2005, held at the University of Kent in the city of Canterbury, UK, 30 June–1 July 2005. The workshop was informal and lively, and the university setting encouragedactive exchangesbetween the speakersand the audience. TheworkshopprogramcomprisedakeynotespeechfromDr.CarlisleAdams, followedby18refereedpapers,withaworkshopdinnerinandguidedtouraround the historic Dover Castle. Dr. Adams is well known for his contributions to the CAST family of s- metric encryption algorithms, to international standards from the IETF, ISO, and OASIS, authorship of over 30 refereed journals and conference papers, and co-authorship of Understanding PKI: Concepts, Standards, and Deployment Considerations (Addison-Wesley). Dr. Adams keynote speech was entitled ‘PKI: Views from the Dispassionate “I”,’ in which he presented his thoughts on why PKIhas been availableas an authentication technology for many years now,but has only enjoyed large-scale success in fairly limited contexts to date. He also presented his thoughts on the possible future(s) of this technology, with emp- sis on the major factors hindering adoption and some potential directions for future research in these areas. In response to the Call for Papers, 43 workshop papers were submitted in total. All papers were blind reviewed by at least two members of the Program Committee, the majority having 3 reviewers, with a few borderline papers h- ing 4 or more reviewers; 18 papers were accepted for presentation in 8 sessions.

Editors and Affiliations

  • Computing Laboratory, University of Kent, UK

    David Chadwick

  • The Computing Laboratory, University of Kent, Canterbury, UK

    Gansen Zhao

Bibliographic Information

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access