Engineering Notes
Created by admin on Thu, 17/05/2012 - 15:31
Sub Topic:
Distributed Systems Overview
Upload File:
Department:
Chapter Name:
Distributed Systems
Description:
We’ve seen in the last few chapters how people can authenticate themselves to systems
(and systems can authenticate themselves to each other) using security protocols; how
access controls can be used to manage which principals can perform which operations
in a system; and some of the mechanics of how crypto can be used to underpin access
control in distributed systems.
Add new comment