Search
Now showing items 1-2 of 2
Performance evaluation of kerberos cross-realm authentication using SIMNET
(Dhirubhai Ambani Institute of Information and Communication Technology, 2011)
Today, the network is being implemented in such a manner that consist of geographi-
cally diverse clients and distributed as well as centralized servers. To prevent unauthorized access to system resources such as servers, ...
Prolog based approach to reasoning about dynamic hierarchical key assignment schemes
(Dhirubhai Ambani Institute of Information and Communication Technology, 2011)
The problem of allowing the higher level users access the information related to lower level is called Hierarchical Access Control Problem. In a hierarchical access control system, users are partitioned into a number of ...