Abstract
A consistent approach to authentication and access control is proposed. In this new approach, resource management is included. By combining the properties of public key encryption with cascading proxies a single mechanism is devised to provide these three aspects of protection.
Original language | English |
---|---|
Pages (from-to) | 124-125 |
Journal | Electronics Letters |
Volume | 30 |
Issue number | 2 |
DOIs | |
Publication status | Published - 1994 |
Keywords
- public key cryptography