Protocols for Secure Distributed Computing |
We will give you what you want | |
![]() |
User authentication and key exchange |
![]() |
Authorization and delegation |
![]() |
Secure communication (SSL, SKIP, secure multicast) |
![]() |
Integration into applications such as RMI |
![]() |
Integration into the enterprise (legacy systems ...) |