Search
Now showing items 1-3 of 3
Delegation and not-so smart cards
(1999)
We consider three aspects of delegation: What kinds of binding are required between real world artifacts and bit patterns? What are the atomic elements of a security policy and in what ways must they fit together? What are ...
Binding bit patterns to real world entities
(1998)
Public key cryptography is often used to verify the integrity of a piece of data, or more generally to ensure that operations which modify the data have been requested and carried out by principals who are authorized to ...
Binding bit patterns to real world entities
(University of Hertfordshire, 1997)
Public key cryptography is often used to verify the integrity of a piece of data, or more generally to ensure that operations which modify the data have been requested and carried out by principles who are authorized to ...