Table of ContentsIntegrating Security and Policy with Enterprise Applications The end goal of security By itself, a PKI is not enough Integrating Security - Incomplete Attempts Where we are today � and for tomorrow To Integrate Security Credential Management Security Integration Generic Authorization and Access-control API Extended Access Control Lists Specification of Conditions Integrating other services Summary |
Author: Clifford Neuman
Email: [email protected] Home Page: http://www.cliffordneuman.com Other information: |