Outline for May 20, 2004

  1. Authentication
    1. Passwords
    2. Challenge-Response
    3. Biometrics
    4. Location
    5. Multiple methods
  2. Access Control Mechanisms
    1. Access control lists
    2. Capabilities
    3. Locks and Keys
    4. Type checking


Here is a PDF version of this document.