Abstract
We consider three aspects of delegation: What kinds of binding are required between real world artifacts and bit patterns? What are the atomic elements of a security policy and in what ways must they fit together? What are the physical requirements for dedicated hardware to bear this semantic burden?
| Original language | English |
|---|---|
| Pages (from-to) | 154-157 |
| Journal | Lecture Notes in Computer Science (LNCS) |
| Volume | 1550 |
| DOIs | |
| Publication status | Published - 1999 |
Fingerprint
Dive into the research topics of 'Delegation and not-so smart cards'. Together they form a unique fingerprint.Cite this
- APA
- Author
- BIBTEX
- Harvard
- Standard
- RIS
- Vancouver