Of course, it wouldn't hurt at all to consult with any Project Athena people at MIT.. Seth Arnold wrote: > > On Mon, Mar 18, 2002 at 11:05:21PM -0500, Samuel R. Baskinger wrote: > > How do you authenticate over a distributed environment? Once you are > > authenticating, whos authentication will you trust, and to what level? > > Anyone considering research on this subject would be wise to consult, > Towards Acceptable Metrics of Authentication > by Michael K. Reiter and Stuart G. Stubblebine. > Published at IEEE Security and Privacy conference in 1997. > > -- > http://sardonix.org/ > > ------------------------------------------------------------------------ > Part 1.2Type: application/pgp-signature -- James W. Meritt CISSP, CISA Booz | Allen | Hamilton phone: (410) 684-6566 ----------------------------------------------------------------- This list is provided by the SecurityFocus ARIS analyzer service. For more information on this free incident handling, management and tracking system please see: http://aris.securityfocus.com
This archive was generated by hypermail 2b30 : Thu Mar 21 2002 - 07:28:00 PST