Check out the new USENIX Web site. next up previous
Next: System Architecture Up: Secure and Flexible Global Previous: Other Protocols

DisCFS Design

 
  
Figure 1: Delegation of privileges, from the administrator to Alice, and from Alice to Bob. The administrator grants Alice full access by issuing her the first certificate. Alice can then delegate read access to Bob by issuing him the second certificate. To be granted access Bob must present a certificate chain consisting of both certificates.
\begin{figure}
\begin{center}

\epsfig {file=Figure-1.eps,height=2in}
\end{center}\end{figure}



 

Stefan Miltchev
4/8/2003