Outline for May 20, 2004
Authentication
Passwords
Challenge-Response
Biometrics
Location
Multiple methods
Access Control Mechanisms
Access control lists
Capabilities
Locks and Keys
Type checking
Here is a PDF version of this document.