A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2010; you can also visit the original URL.
The file type is
Authentication has traditionally been done either in a decentralized manner with human assistance or automatically through a centralized security infrastructure. In the security infrastructure approach, a central trusted authority takes on the responsibility of authenticating participants within its domain of control. While the security infrastructure approach works well in traditional organizations, it does not address the needs of open membership systems. We propose automatic decentralizeddoi:10.7282/t3g1613t fatcat:vf5czvah7ncb3flkpszvpwrvsq