Access control meets public key infrastructure, or: assigning roles to strangers | IEEE Conference Publication | IEEE Xplore