Abstract
A consistent approach to authentication and access control is proposed. In this new approach, resource management is included. By combining the properties of public key encryption with cascading proxies a single mechanism is devised to provide these three aspects of protection.

This publication has 3 references indexed in Scilit: