| Protocols for Secure Distributed Computing |
| We will give you what you want | |
|
|
User authentication and key exchange |
|
|
Authorization and delegation |
|
|
Secure communication (SSL, SKIP, secure multicast) |
|
|
Integration into applications such as RMI |
|
|
Integration into the enterprise (legacy systems ...) |