Abstract
A consistent approach to authentication and access control is proposed. In this new approach, resource management is included. By combining the properties of public key encryption with cascading proxies a single mechanism is devised to provide these three aspects of protection.
| Original language | English |
|---|---|
| Pages (from-to) | 124-125 |
| Journal | Electronics Letters |
| Volume | 30 |
| Issue number | 2 |
| DOIs | |
| Publication status | Published - 1994 |
Keywords
- public key cryptography