PLAN Security Guide
*
for PLAN version 3.2
Michael W. Hicks
Introduction
Authentication
Autheval
Authentication protocol
Authentication Tutorial
Implementation Notes
Authorization
Monolithic Approach
Query Certificate Manager
Authorization Tutorial
Implementation Notes
Future Directions
References
This document was tranlated from L
A
T
E
X by
H
E
V
E
A and H
A
C
H
A
.