Strong Authentication and Authorization model Using PKI, PMI, and Directory

Since Internet has been used commonly in information systems technologies, many applications need some security capabilities to protect against threats to the communication of information. Two critical procedures of these capabilities are authentication and authorization. This report presents a...
By Jong Lee
October 25, 2001

All papers are copyrighted. No re-posting of papers is permitted