Re: Suggestions for research

From: Meritt James (meritt_jamesat_private)
Date: Wed Mar 20 2002 - 07:57:11 PST

  • Next message: Matthew.Brownat_private: "IRDF Reference List v0.1 (Draft for mass peer review)"

    Of course, it wouldn't hurt at all to consult with any Project Athena
    people at MIT..
    
    Seth Arnold wrote:
    > 
    > On Mon, Mar 18, 2002 at 11:05:21PM -0500, Samuel R. Baskinger wrote:
    > > How do you authenticate over a distributed environment? Once you are
    > > authenticating, whos authentication will you trust, and to what level?
    > 
    > Anyone considering research on this subject would be wise to consult,
    > Towards Acceptable Metrics of Authentication
    > by Michael K. Reiter and Stuart G. Stubblebine.
    > Published at IEEE Security and Privacy conference in 1997.
    > 
    > --
    > http://sardonix.org/
    > 
    >   ------------------------------------------------------------------------
    >    Part 1.2Type: application/pgp-signature
    
    -- 
    James W. Meritt CISSP, CISA
    Booz | Allen | Hamilton
    phone: (410) 684-6566
    
    -----------------------------------------------------------------
    This list is provided by the SecurityFocus ARIS analyzer service.
    For more information on this free incident handling, management 
    and tracking system please see: http://aris.securityfocus.com
    



    This archive was generated by hypermail 2b30 : Thu Mar 21 2002 - 07:28:00 PST