MC Li, J Ma, H Yao - First International Conference on …, 2006 - ieeexplore.ieee.org
Proxy credentials are commonly used in security system when one entity wishes to grant
some set of its privileges to another entity. Proxy credential chain is produced when new …