Strong Authentication and Authorization model Using PKI, PMI, and Directory
Since Internet has been used commonly in information systems technologies, many applications need some security capabilities to protect against threats to the communication of information. Two critical procedures of these capabilities are authentication and authorization. This report presents a...