Security Protocols 2006: Security Protocols pp 150-152 | Cite as

Innovations for Grid Security from Trusted Computing

(Transcript of Discussion)
  • Wenbo Mao
Part of the Lecture Notes in Computer Science book series (LNCS, volume 5087)

Abstract

Bruno Crispo: But why do you need to chain the certificates, I don’t understand. Usually I look for, for example, storage, and then I go find somewhere that can provide the storage I need, but why do I need a chain?

Reply: Do you mean, you do it yourself?

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Copyright information

© Springer-Verlag Berlin Heidelberg 2009

Authors and Affiliations

  • Wenbo Mao
    • 1
  1. 1.Hewlett-Packard LaboratoriesChina

Personalised recommendations