6.033 Spring 2005: Preparation for Lecture 23
Monday, May 2
Read Sections C and D of chapter 11. Today we will study how to provide confidentiality of the content of messages that are sent over untrusted networks and mechanisms to perform authorization (i.e., deciding which principles are allowed to perform the requested operation).
|