dc.contributor.author | Low, M.R. | |
dc.contributor.author | Christianson, B. | |
dc.date.accessioned | 2009-06-18T08:50:24Z | |
dc.date.available | 2009-06-18T08:50:24Z | |
dc.date.issued | 1994 | |
dc.identifier.citation | Low , M R & Christianson , B 1994 , ' Technique for authentication, access control and resource management in open distributed systems ' , Electronics Letters , vol. 30 , no. 2 , pp. 124-125 . https://doi.org/10.1049/el:19940079 | |
dc.identifier.issn | 0013-5194 | |
dc.identifier.other | dspace: 2299/3610 | |
dc.identifier.uri | http://hdl.handle.net/2299/3610 | |
dc.description | The copy of record is available at IET Digital Library. [Full text of this article is not available in the UHRA] | |
dc.description.abstract | A consistent approach to authentication and access control is proposed. In this new approach, resource management is included. By combining the properties of public key encryption with cascading proxies a single mechanism is devised to provide these three aspects of protection. | en |
dc.language.iso | eng | |
dc.relation.ispartof | Electronics Letters | |
dc.subject | public key cryptography | |
dc.title | Technique for authentication, access control and resource management in open distributed systems | en |
dc.contributor.institution | School of Computer Science | |
dc.contributor.institution | Centre for Computer Science and Informatics Research | |
dc.contributor.institution | School of Physics, Engineering & Computer Science | |
dc.description.status | Peer reviewed | |
rioxxterms.versionofrecord | 10.1049/el:19940079 | |
rioxxterms.type | Journal Article/Review | |
herts.preservation.rarelyaccessed | true | |