Mr. Low et B. Christianson, TECHNIQUE FOR AUTHENTICATION, ACCESS-CONTROL AND RESOURCE-MANAGEMENT IN OPEN DISTRIBUTED SYSTEMS, Electronics Letters, 30(2), 1994, pp. 124-125
A consistent approach to authentication and access control is proposed
. Ln this new approach, resource management is included. By combining
the properties of public key encryption with cascading proxies a singl
e mechanism is devised to provide these three aspects of protection.