A consistent approach to authentication and access control is proposed. In this new approach, resource management is included. By combining the properties of public key encryption with cascading proxies a single mechanism is devised to provide these three aspects of protection.
|Publication status||Published - 1994|
- public key cryptography