dc.contributor.author | Christianson, B. | |
dc.contributor.author | Malcolm, J. | |
dc.date.accessioned | 2010-03-17T11:53:23Z | |
dc.date.available | 2010-03-17T11:53:23Z | |
dc.date.issued | 1999 | |
dc.identifier.citation | Christianson , B & Malcolm , J 1999 , ' Delegation and not-so smart cards ' , Lecture Notes in Computer Science (LNCS) , vol. 1550 , pp. 154-157 . https://doi.org/10.1007/3-540-49135-X_23 | |
dc.identifier.issn | 0302-9743 | |
dc.identifier.other | dspace: 2299/4347 | |
dc.identifier.uri | http://hdl.handle.net/2299/4347 | |
dc.description | Original article can be found at: www.springerlink.com Copyright Springer. [Full text of this article is not available in the UHRA] | |
dc.description.abstract | We consider three aspects of delegation: What kinds of binding are required between real world artifacts and bit patterns? What are the atomic elements of a security policy and in what ways must they fit together? What are the physical requirements for dedicated hardware to bear this semantic burden? | en |
dc.language.iso | eng | |
dc.relation.ispartof | Lecture Notes in Computer Science (LNCS) | |
dc.title | Delegation and not-so smart cards | en |
dc.contributor.institution | School of Computer Science | |
dc.contributor.institution | Centre for Computer Science and Informatics Research | |
dc.contributor.institution | School of Physics, Engineering & Computer Science | |
dc.description.status | Peer reviewed | |
rioxxterms.versionofrecord | 10.1007/3-540-49135-X_23 | |
rioxxterms.type | Journal Article/Review | |
herts.preservation.rarelyaccessed | true | |