Show simple item record

dc.contributor.authorLow, M.R.
dc.contributor.authorChristianson, B.
dc.date.accessioned2010-10-05T10:18:18Z
dc.date.available2010-10-05T10:18:18Z
dc.date.issued1994
dc.identifier.citationLow , M R & Christianson , B 1994 , Self authenticating proxies . UH Computer Science Technical Report , vol. 201 , University of Hertfordshire .
dc.identifier.otherPURE: 95227
dc.identifier.otherPURE UUID: 3999c86e-60b5-4023-891b-753331ecea9f
dc.identifier.otherdspace: 2299/4880
dc.identifier.otherScopus: 0028729754
dc.identifier.urihttp://hdl.handle.net/2299/4880
dc.description.abstractAuthentication and access control are usually implemented as two separate protection mechanisms because they are logically separate functions. A consistent approach to both of these functions is proposed in this paper. In this new approach, resource management, another aspect of protection, can also be included. By combining the properties of public key encryption with cascading proxies, a single mechanism is devised to provide these three aspects of protection. The mechanism provides independence from the system infrastructure and from any particular security domain, control policy or authentication server enabling principals to define and enforce their own protection requirements.en
dc.language.isoeng
dc.publisherUniversity of Hertfordshire
dc.relation.ispartofseriesUH Computer Science Technical Report
dc.rightsOpen
dc.titleSelf authenticating proxiesen
dc.contributor.institutionSchool of Computer Science
dc.contributor.institutionCentre for Computer Science and Informatics Research
dcterms.dateAccepted1994
rioxxterms.typeOther
herts.preservation.rarelyaccessedtrue
herts.rights.accesstypeOpen


Files in this item

Thumbnail

This item appears in the following Collection(s)

Show simple item record