Check out the new USENIX Web site. next up previous
Next: Login Up: The CRISIS Wide Area Architecture Previous: Authorization

CRISIS Protocols

  Given the above high level description of the CRISIS architecture, we will now describe how the various system components interact to allow secure execution of routine tasks, including login, file access, and job execution (operations that potentially cross machine and/or administrative boundaries).



 

Amin Vahdat
12/10/1997