Map
Index
Random
Help
th

Quote: end-to-end authorization across administrative, network, abstraction, and protocol boundaries; uses SPKI

topics > all references > references g-h > QuoteRef: howeJ_2000 , p. abstract



Topic:
authentication
Topic:
reliable communication

Quotation Skeleton

Many boundaries impede the flow of authorization information, … … Our approach allows applications that span administrative, network, … [p. 153] [We developed end-to-end authorization for Snowflake using] the Java implementation of SPKI by … [ref] …   Google-1   Google-2

Copyright clearance needed for quotation.


Related Topics up

Topic: authentication (87 items)
Topic: reliable communication (29 items)

Copyright © 2002-2008 by C. Bradford Barber. All rights reserved.
Thesa is a trademark of C. Bradford Barber.