Technique for authentication, access control and resource management in open distributed systems

M.R. Low, B. Christianson

Research output: Contribution to journalArticlepeer-review

7 Citations (Scopus)

Abstract

A consistent approach to authentication and access control is proposed. In this new approach, resource management is included. By combining the properties of public key encryption with cascading proxies a single mechanism is devised to provide these three aspects of protection.
Original languageEnglish
Pages (from-to)124-125
JournalElectronics Letters
Volume30
Issue number2
DOIs
Publication statusPublished - 1994

Keywords

  • public key cryptography

Fingerprint

Dive into the research topics of 'Technique for authentication, access control and resource management in open distributed systems'. Together they form a unique fingerprint.

Cite this