Integrating Security and Policy with Enterprise Applications

1/31/00


Click here to start


Table of Contents

Integrating Security and Policy with Enterprise Applications

The end goal of security

By itself, a PKI is not enough

Integrating Security - Incomplete Attempts

Where we are today

and for tomorrow

To Integrate Security

Credential Management

Security Integration

Generic Authorization and Access-control API

Extended Access Control Lists

Specification of Conditions

Integrating other services

Summary

Author: Clifford Neuman

Email: bcn@isi.edu

Home Page: http://www.cliffordneuman.com

Other information:
Presentation at Y2K RSA Conference, San Jose California, for CyberSafe Corporation