Protocols for Secure Distributed Computing
We will give you what you want
User authentication and key exchange
Authorization and delegation
Secure communication (SSL, SKIP, secure multicast)
Integration into applications such as RMI
Integration into the enterprise (legacy systems ...)

Return to Tracks