Distributed System Authentication



next up previous contents
Next: The Need: Identity Up: Robust Authentication Procedures Previous: Identification and Authentication

Distributed System Authentication

According to [WL92], there are three main types of authentication in a distributed computing system.



John Barkley
Fri Oct 7 16:17:21 EDT 1994