Guidelines to help assess and facilitate interoperable trustworthy Public Key Infrastructures, Public Draft for Comment, Information Security Committee, 2001. ,
VOMS, an Authorization System for Virtual Organizations, presented at the 1st European Across Grids Conference, 2003. ,
DOI : 10.1007/978-3-540-24689-3_5
Organization Based Access Control (Or-BAC, IEEE 4th International Workshop on Policies for Distributed Systems and Networks, 2003. ,
Infrastructure for Public Key Infrastructure (APKI), 1998. ,
Authorization for a Large Heterogeneous Multi-Domain System, Australian Unix and Open Systems Group National Conference, pp.159-169, 1997. ,
Un modèle de gestion de VPN basé sur les utilisateurs, 2003. ,
Negotiation de politiques de sécurité, Sécurité et Architecture Réseaux, p.7, 2003. ,
Secure computer system : Mathematical foundations, 1973. ,
Une méthode d'aide à la conception fonctionnelle de systèmes techniques multi-technologies, Revue internationale Génie Logiciel, pp.57-89, 2001. ,
AKMP: an adaptive key management protocol for secure multicast, Proceedings. Eleventh International Conference on Computer Communications and Networks, pp.14-16, 2002. ,
DOI : 10.1109/ICCCN.2002.1043065
Decentralized Trust ManagementKeyNote : Trust Management for Public-Key Infrastructures, Proceedings of the 1996 IEEE Symposium on Security and Privacy, pp.164-73, 1996. ,
INJAC : de l'utilisation de Cocoon et J2EE pour la gestion du cycle de vie de documents web, 2003. ,
The PERMIS X.509 Based Privilege Management Infrastructure, IETF DRAF, 2002. ,
An X.509 Role-based Privilege Management Infrastructure Business briefing : global infosecurity, 2002. ,
URL : https://hal.archives-ouvertes.fr/hal-01463660
LDAP Schema for X.509 Attribute CertificatesDigital Signature and Multiple Signature : Different Cases for Different Purposes, Chafic, 03] Chafic Maroun Rouhana Moussa SANS Institute, 2003. ,
Certificate chain discovery in SPKI/SDSI, Computer Security Journal, v 9, pp.285-322, 2001. ,
DOI : 10.3233/JCS-2001-9402
SPKI/SDSI HTTP Server / Certificate Chain Discovery in SPKI/SDSI, Thèse de MoS MIT, 2001. ,
Implementation of a discretionary access control model for scriptbased systems, Proceedings of the 8th IEEE Workshop on Computer Security Foundations, 1995. ,
Infrastructure de gestion de clés, CNRS-UREC, 2000. ,
Administration des objets sécurisés, Direction Centrale de la Sécurité des Systèmes d'Information, 2003. ,
Cross Domain Access Control via PKI",From Policies for Distributed Systems and Networks, 2002. ,
New Directions in Cryptography, In IEEE Trans. on Info. Theory, pp.644-654, 1976. ,
10 Risks of PKI, In Computer Security Journal, vol.16, issue.1, pp.1-7, 2000. ,
Naming and certificates, Proceedings of the tenth conference on Computers, freedom and privacy challenging the assumptions, CFP '00, 2000. ,
DOI : 10.1145/332186.332286
The nature of a usable PKI, Computer Networks 31, pp.823-830, 1999. ,
Rivest et plusCertficate Chain Discovery in SPKI/SDSI, 2000. ,
Electronic Signature Formats, 2003. ,
International Harmonization of Electronic Signature Formats, Publication ETSI TR, vol.102, p.47, 2004. ,
Policy requirements for CSPs issuing attribute certificates, Publication ETSI TS, vol.102, p.158, 2003. ,
International Harmonization of Policy Requirements for CAs issuing Certificates, 2004. ,
Qualified Certificate ProfileElectronic Signatures Formats, 2000. ,
Identification of requirements for attribute certification, Publication ETSI TR, vol.102, p.44, 2002. ,
Proposed NIST standard for role-based access control, ACM Transactions on Information and System Security, vol.4, issue.3, pp.222-274, 2001. ,
DOI : 10.1145/501978.501980
Role-based access controls, Proc. 15th NIST-NCSC National Computer Security Conference, pp.554-563, 1992. ,
Attribute Certificate Policies Extension" IETF DRAF december, 2003. ,
DOI : 10.17487/rfc4476
Services évolués de multisignature basés sur les certificats d'attributs, Sécurité et Architecture Réseaux, pp.8-12, 2002. ,
Etude et analyse des problèmes liés aux certificats X.509 et etude d'autres alternatives, 2002. ,
Controlling digital multi-signature with attribute certificate, 18th Annual Computer Security Applications Conference, 2002. ,
Attribute certificates for the growth of e-services, proceeding of GRES'03, 2003. ,
Infrastructure de confiance pour integrer de nouveaux e-services utilisant les certificats d'attribut, proceedings of IEEE International Canadian Conference on Electrical and Computer Engineering, 2003. ,
Utilisations des certificats d'attribut pour accélérer l'usage de la signature électronique, Proceedings of Conference on Network, pp.17-21, 2003. ,
Role Based Control via Attirbute certificates, Proceedings of IEEE International Conference on Information & Communication Technologies : from Theory to Applications, 2004. ,
Sécurité dans les réseaux, Memoire, 2000. ,
Formal specification for role based access control user/role and role/role relationship management, Proceedings of the third ACM workshop on Role-based access control , RBAC '98, pp.81-90, 1996. ,
DOI : 10.1145/286884.286902
Guide de l'attribut professionnel dans la signature électronique, Conclusions du Groupe de Travail sur la Gestion des Attributs (GT-GA), 2004. ,
Elliptic-Curve Digital Signatures and Accessories, Proceedings of the International Workshop on Cryptographic Techniques & E-Commerce, pp.126-130, 1999. ,
Batch verifying multiple RSA digital signatures, Electronics Letters, vol.34, issue.12, pp.1219-1220, 1998. ,
DOI : 10.1049/el:19980833
New scheme for digital multisignatures, Electronics Letters, vol.25, issue.15, 1989. ,
DOI : 10.1049/el:19890670
Assertions and Protocol for the OASIS Security Assertion Markup Language (SAML), draft-ssct-core-31, 2002. ,
A Formal Semantics for SPKI, ESORICS, 2000. ,
DOI : 10.1007/10722599_9
An internet security framework based on short-lived certificates, IEEE Internet Computing, pp.73-79, 1998. ,
Secure Flow : A Secure Web enabled Workflow Management System, Proceedings of the fifth ACM workshop on Role-based access control, 2000. ,
Spécification de Besoins, 2001. ,
Analyse de besoins -l'institution de la sécurité ou comment s'en désintéresser, Projet ICARE-UTC Gradient, 2002. ,
01] Projet I-CARE , "Modèles technico-économiques d'architecture de confiance PKI, UTC, 2001. ,
Evaluation sécuritaire ? Note de sensibilisation au processus d'évaluation, 2002. ,
Evaluation sécuritaire ? Note de sensibilisation aux exigences pour la réalisation, 2002. ,
E-services utilisant les certificats d'attribut, 2002. ,
Exemple du service de multisignature contrôlée, 2002. ,
Spécification de l'infrastructure, Projet ICARE- LGI2P, 2002. ,
Spécification des Services Evolués de Signature, Projet ICARE-LGI2P, 2002. ,
Etat de l'art Délivrable 1.4 ? PARTIE I", Projet I-CARE Projet ICARE-ENST, 2002. ,
A Privilege Management Scheme for Mobile Agent Systems, International Conference on Autonomous Agents, 2002. ,
DOI : 10.1016/S1571-0661(04)80339-6
Internet access through LAN with XML encoded SPKI certificates, Proceedings of the NordSec'00, 2000. ,
Protection, 5th Princeton Symposium on Information Sciences and Systems, pp.437-443, 1971. ,
DOI : 10.1145/775265.775268
Authentication protocols with nonrepudiation services in personal communication systems, IEEE Communications Letters, vol.3, issue.8, pp.236-238, 1999. ,
DOI : 10.1109/4234.781006
The PRIMA System for Privilege Management, Authorization and Enforcement in Grid Environments, 4th Int, 2003. ,
A hardware-secured credential repository for grid PKIs, IEEE International Symposium on Cluster Computing and the Grid, 2004. CCGrid 2004., 2004. ,
DOI : 10.1109/CCGrid.2004.1336679
Lattice-Based Access Control Models, In IEEE Computer, vol.26, issue.11, pp.9-19, 1993. ,
An implementation of un secure web client using SPKI/SDSI certificates, Thèse de MoS MIT, 2000. ,
Inter-Domain authorization and delegation for business-to-business ecommerce : conference, eBusiness and eWork Conference, 2001. ,
Tsudik Secret sets and applicationsInformation processing letters, 1998. ,
Public Key Infrastructure Technical Committee, [en ligne] Disponible sur : http ://www.oasis-open.org/committees/tc_home.php?wg_abbrev=wss, pp.5-2004 ,
Capability Card : An Attribute Certificate in XML, IETF Internet DRAFT, 1998. ,
XML Encoding of SPKI Certificates, 2000. ,
Smart Certificates : Extending X.509 for Secure Attribute Services on the Web, ACM Transactions on Information and System Security, 2001. ,
Adding SPKI Certificates to JDK 1.2, Proceedings of the NordSec'98, the Third Nordic Workshop on Secure IT Systems, 1998. ,
) : Les principes de la conservation juridique, ICARE-Archivage Projet ICARE, vol.1, 2002. ,
ICARE-Datation juridique et horodatage technique, Projet ICARE, 2003. ,
ICARE-Archivage électronique (2) : La pratique de l'archivage électronique, Projet ICARE, 2002. ,
ICARE-La Directive Européenne Signature Electronique, Projet ICARE, 2003. ,
ICARE-Compte-rendu et synthèse du Groupe de Travail Habilitation, Projet ICARE, 2002. ,
ICARE-La qualité de mandataire chez le signataire, Projet ICARE, 2003. ,
ICARE-Comptes-rendus et travaux du Groupe de Travail Interopérabilité, Projet ICARE, 2002. ,
ICARE-Le cycle de vie de l'écrit électronique, Projet ICARE, 2003. ,
ICARE-Les A.C. et leurs opérateurs (OSC), Projet ICARE, 2002. ,
ICARE-La notion d'A.E. et le Droit, Projet ICARE, 2002. ,
ICARE-Politique de Signature es-qualité type, Projet ICARE, 2003. ,
ICARE-La notion d'AC et le Droit, Projet ICARE, 2002. ,
ICARE-Utilisation de la signature électronique : la dématérialisation documentaire dans les téléprocédures, Projet ICARE, 2003. ,
ICARE-La notion de PKI et le Droit, Projet ICARE, 2002. ,
ICARE-Le Décret n°2002-535 et la signature électronique, Projet ICARE, 2002. ,
ICARE-Régime juridique prospectif du certificat d'attributs, Projet ICARE, 2002. ,
ICARE-Spécifications des besoins en matière de signature électronique juridique, Projet ICARE, 2002. ,
ICARE-Utilisation de la signature électronique : La dématérialisation documentaire dans le Commerce électronique, Projet ICARE, 2002. ,
ICARE-Recueil des textes juridiques applicables à la signature électronique, Projet ICARE, 2002. ,
Politique de Certification-type version 3, émis par le Ministère de l'Economie, des Finances et de l'Industrie, 2003. ,
Procédures et politiques de certification de clés PC2 Version 2.2, émis par la Commission Interministérielle pour la Sécurité des Systèmes d'Information (CISSI), 2001. ,
ICARE-Spécification de besoins professionnels en matière de signature électronique, Projet ICARE, 2002. ,
A community authorization service for group collaboration, Proceedings Third International Workshop on Policies for Distributed Systems and Networks, 2002. ,
DOI : 10.1109/POLICY.2002.1011293
URL : http://arxiv.org/abs/cs/0306053
Distributed Policy Management for JDK 1.2, Proceedings of the 1999 Network and Distributed Systems Security Symposium, pp.91-102, 1999. ,
DSS Use Case Requirements, Analysis, OASIS Working Draft, vol.11, 2003. ,
PKCS#10 : Certification Request Syntax StandardPKI Action Plan Version : 1.0, Prepared and Published by the OASIS Public Key Infrastructure (PKI) Technical Committee (TC), 2000. ,
Compliance-Checking in the PolicyMaker Trust- Management System, Proc. 2nd Financial Crypto Conference. Anguilla 1998, pp.251-265, 1998. ,
The MD5 Message-Digest Algorithm, 1321. ,
DOI : 10.17487/rfc1321
RFC2315 : PKCS#7 : Cryptographic Message Syntax, 1998. ,
Internet X.509 Certificate Request Message Format, p.2511, 1999. ,
DOI : 10.17487/rfc2511
Certificate Policy and Certification Practices Framework, 1999. ,
Domain Name System Security Extensions, RFC, p.2535, 1999. ,
DOI : 10.17487/rfc2535
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.165.3700
RFC2630 : Cryptographic Message Syntax ? CMS, Juin, 1999. ,
SPKI Requirements" RFC 2692 IETF, septembre, 1999. ,
DOI : 10.17487/rfc2692
SPKI Certificate Theory, 1999. ,
DOI : 10.17487/rfc2693
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.189.1209
Certificate Management Messages over CMS, 2000. ,
DOI : 10.17487/rfc2797
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.180.8289
AAA Authorization Framework, 2000. ,
DOI : 10.17487/rfc2904
Electronic Signature Formats for long term electronic signatures, 2001. ,
DOI : 10.17487/rfc3126
XML-Signature Syntax and Processing, 2002. ,
DOI : 10.17487/rfc3075
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.637.2849
An Internet Attribute Certificate Profile for Authorization, 2002. ,
Policy Requirements for Time-Stamping Authorities, IETF RFC, vol.3628, issue.20, 2003. ,
DOI : 10.17487/rfc3628
Internet X.509 Public Key Infrastructure Certificate Policy and Certification Practices Framework, 2003. ,
Standard For The Format Of Arpa Internet Text Messages, RFC, vol.822, issue.822, 1982. ,
A Simple Distributed Security Infrastructure" MIT, septembre, 1996. ,
S-expression, Draft IETF, 1997. ,
A Simple Distributed Security Infrastructure version 2, 1998. ,
TMAC : A primitive for Applying RBAC in collaborative environment. 2 nd ACM, pp.13-19, 1997. ,
S/MIME Mail Security (smime), Disponible sur, 2004. ,
Access control : Policies, models, and mechanisms. Foundations of Security Analysis and Design, LNCS, vol.2171, 2001. ,
Role-based access control models, Computer, vol.29, issue.2, pp.38-47, 1996. ,
DOI : 10.1109/2.485845
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.30.3867
The ARBAC97 Model for Role-Based Administration of Roles, ACM Transactions on Information and System Security, vol.2, issue.1, 1999. ,
Internet X.509 Public Key Infrastructure Logotypes in X.509 certificates, Disponible sur, 2003. ,
DOI : 10.17487/rfc3709
La monnaie électronique et les systèmes de paiements sécurisés, 2000. ,
SET et SSL : protocoles pour les échanges de données sécurises sur Internet, 1997. ,
SET and SSL: electronic payments on the Internet, Proceedings Third IEEE Symposium on Computers and Communications. ISCC'98. (Cat. No.98EX166), 2004. ,
DOI : 10.1109/ISCC.1998.702546
Task-based authorization controls (TBAC): a family of models for active and enterprise-oriented authorization management, 11th IFIP Working Conference on Database Security, 1997. ,
DOI : 10.1007/978-0-387-35285-5_10
Authorization Policy in a PKI Environment, Proceedings of the 1 st Annual NIST workshop on PKI, 2002. ,
Certificate based Access Control for Widely Distributed Resources, Proceedings of the Eighth Usenix Security Symposium, 1999. ,
Certificate-based authorization policy in a PKI environment, ACM Transactions on Information and System Security, vol.6, issue.4, pp.566-588, 2003. ,
DOI : 10.1145/950191.950196
How role based access control is implemented in SESAME, Proceedings of IEEE 6th Workshop on Enabling Technologies: Infrastructure for Collaborative Enterprises, pp.293-298, 1997. ,
DOI : 10.1109/ENABL.1997.630828
Performance Comparison of Public-Key Cryptosystems, CryptoBytes(RSA), vol.4, issue.1, 1998. ,
Modeling and Transformation of Workflows with Temporal Constraints, 2003. ,
OASIS Web Services Security TC " [en ligne]. Disponible sur, pp.5-2004 ,
A Batch-Verifying Algorithm for Multiple Digital Signatures (E) Information technology -Open Systems Interconnection -The Directory : Overview of concepts, models and services, Proceedings of the IASTED International Conference on Parallel and distributed Computing and Systems MIT, p.1995, 1995. ,
Rapport de recherche-consultation réalisée pour le Secrétariat du Conseil du trésor du Québec, XML en route au gouvernement du Québec, 2001. ,
Controlling digital multi-signature with attribute certificate, Production Scientifique Personnelle Conférences Internationales avec comité de lecture ? proceeding of the18th Annual Computer Security Applications Conference, pp.9-13, 2002. ,
Confidence infrastructure to integrate new e-services using attribute certificates, proceedings of IEEE International Canadian Conference on Electrical and Computer Engineering (IEEE CCECE 2003), pp.4-7, 2003. ,
Role based control via attribute certificate, Proceedings of IEEE International Conference on Information & Communication Technologies : from Theory to Applications, pp.19-23, 2004. ,
Guide de l'attribut professionnel dans la signature électronique, Conclusions du Groupe de Travail sur la Gestion des Attributs (GT-GA), 2004. ,
Services évolués de multisignature basés sur les certificats d'attributs, Conférences Internationales Francophones avec comité de lecture ? Proceedings of International French Conference on Security and Network Architectures, pp.8-14, 2002. ,
Attribute certificates for the growth of e-services, Proceedings of International Conference on Networks and Services Management, pp.24-27, 2003. ,
Utilisations des certificats d'attribut pour accélérer l'usage de la signature électronique, Proceedings of International French Conference on Network, pp.17-21, 2003. ,
Etude et Analyse des problèmes liés aux certificats X.509 et Etude d'autres alternatives, Présentations lors de journées scientifiques avec article rédigé ? Proceedings of Journées des Doctorants '01 du Centre de Recherche LGI2P, 2001. ,
Services évolués de multisignature, Proceedings of Journées des Doctorants '02 du Centre de Recherche LGI2P, pp.27-28, 2002. ,
Nouveaux e-services nécessaires à la croissance des transactions électroniques, Journées GEMSTIC'03 Sûreté et Qualité de systèmes d'information, p.2, 2003. ,