Abstract
We consider three aspects of delegation: What kinds of binding are required between real world artifacts and bit patterns? What are the atomic elements of a security policy and in what ways must they fit together? What are the physical requirements for dedicated hardware to bear this semantic burden?
| Original language | English |
|---|---|
| Pages (from-to) | 154-157 |
| Journal | Lecture Notes in Computer Science (LNCS) |
| Volume | 1550 |
| DOIs | |
| Publication status | Published - 1999 |