Abstract
Virgil Gligor: I also think that the talks point out something which was pointed out by I guess Jim Morrison about 1971, which is the cyclic dependency between security and access control. And I think really that’s one of the few very fundamental observations about security in general. I mean, at some point to do authentication you need access control, and most people recognise that to do access control you need authentication.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsEditor information
Editors and Affiliations
Rights and permissions
Copyright information
© 1998 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
(1998). Discussion Session — Trust Management. In: Christianson, B., Crispo, B., Harbison, W.S., Roe, M. (eds) Security Protocols. Security Protocols 1998. Lecture Notes in Computer Science, vol 1550. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-49135-X_10
Download citation
DOI: https://doi.org/10.1007/3-540-49135-X_10
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-65663-0
Online ISBN: 978-3-540-49135-4
eBook Packages: Springer Book Archive