Show simple item record

dc.contributor.authorLow, M.R.
dc.date.accessioned2010-08-10T10:54:26Z
dc.date.available2010-08-10T10:54:26Z
dc.date.issued1993
dc.identifier.citationLow , M R 1993 , Self defence in open systems using self authenticating proxies . UH Computer Science Technical Report , vol. 161 , University of Hertfordshire .
dc.identifier.otherdspace: 2299/4737
dc.identifier.urihttp://hdl.handle.net/2299/4737
dc.description.abstractMost of the methods currently used to protect both users and systems and their objects and servers, involve authentication of principals and access control of these objects and servers. Authentication and access control are usually implemented as two separate mechanisms because they are logically separate functions. Yet there is little benefit in having one without the other. A consistent approach to both of these functions is proposed in this paper. In this new approach, resource management, (another aspect of protection) can be included. By combining the properties of public key encryption with cascading proxies a single mechanism is devised to provide these three aspects of protection.en
dc.format.extent4141857
dc.language.isoeng
dc.publisherUniversity of Hertfordshire
dc.relation.ispartofseriesUH Computer Science Technical Report
dc.titleSelf defence in open systems using self authenticating proxiesen
dc.contributor.institutionSchool of Computer Science
rioxxterms.typeOther
herts.preservation.rarelyaccessedtrue


Files in this item

Thumbnail

This item appears in the following Collection(s)

Show simple item record