Map
Index
Random
Help
th

Quote: in a distributed system can not separate authentication from authorization; huge sets of people and requests, often from strangers

topics > all references > references a-b > QuoteRef: blazM_1999 , p. 188



Topic:
distributed system security
Topic:
authentication

Quotation Skeleton

A traditional "system-security approach" … first determines who signed the request and then … needed to perform the requested action. We believe … there is a huge set of people (and … made. … Even if the question "who signed this request?" … requested action if the requester is someone or …   Google-1   Google-2

Copyright clearance needed for quotation.


Related Topics up

Topic: distributed system security (16 items)
Topic: authentication (87 items)

Copyright © 2002-2008 by C. Bradford Barber. All rights reserved.
Thesa is a trademark of C. Bradford Barber.