Abstract
We consider three aspects of delegation: What kinds of binding are required between real world artifacts and bit patterns? What are the atomic elements of a security policy and in what ways must they fit together? What are the physical requirements for dedicated hardware to bear this semantic burden?
Original language | English |
---|---|
Pages (from-to) | 154-157 |
Journal | Lecture Notes in Computer Science (LNCS) |
Volume | 1550 |
DOIs | |
Publication status | Published - 1999 |