Topic: authentication
Topic: reliable communication
Quotation Skeleton
Many boundaries impede the flow of authorization information, … … Our approach allows applications that span administrative, network, … [p. 153] [We developed end-to-end authorization for Snowflake using] the Java implementation of SPKI by … [ref] …
Google-1Google-2
Copyright clearance needed for quotation.
Related Topics
Topic: authentication (87 items)
Topic: reliable communication (29 items)