We have presented a theory that explains many … Kerberos protocols; authentication in a hierarchical name space; … unique identifiers as partial substitutes for principle names. … and booting of machines; … passing RPC arguments or results that are principals …
Google-1
Google-2
Copyright clearance needed for quotation.