Engineering Notes

Created by admin on Thu, 17/05/2012 - 15:31
Sub Topic: 
Distributed Systems Overview
Chapter Name: 
Distributed Systems
Description: 
We’ve seen in the last few chapters how people can authenticate themselves to systems (and systems can authenticate themselves to each other) using security protocols; how access controls can be used to manage which principals can perform which operations in a system; and some of the mechanics of how crypto can be used to underpin access control in distributed systems.
engnotes_star_rating: 

Add new comment

Plain text

  • No HTML tags allowed.
  • Web page addresses and e-mail addresses turn into links automatically.