Computer Engineeringelectronics Engineering Civil Engineering |
In an open network computing environment, a workstation cannot be trusted to identify its users correctly to network services. Kerberos provides an alternative approach whereby a trusted third-party authentication service is used to verify users |
|
No comments:
Post a Comment