Skip to main content

Discussion Session — Trust Management

  • Conference paper
  • First Online:
  • 295 Accesses

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 1550))

Abstract

Virgil Gligor: I also think that the talks point out something which was pointed out by I guess Jim Morrison about 1971, which is the cyclic dependency between security and access control. And I think really that’s one of the few very fundamental observations about security in general. I mean, at some point to do authentication you need access control, and most people recognise that to do access control you need authentication.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 1998 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

(1998). Discussion Session — Trust Management. In: Christianson, B., Crispo, B., Harbison, W.S., Roe, M. (eds) Security Protocols. Security Protocols 1998. Lecture Notes in Computer Science, vol 1550. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-49135-X_10

Download citation

  • DOI: https://doi.org/10.1007/3-540-49135-X_10

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-65663-0

  • Online ISBN: 978-3-540-49135-4

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics