Security Protocols 2006: Security Protocols pp 150-152 | Cite as
Innovations for Grid Security from Trusted Computing
(Transcript of Discussion)
Conference paper
Abstract
Bruno Crispo: But why do you need to chain the certificates, I don’t understand. Usually I look for, for example, storage, and then I go find somewhere that can provide the storage I need, but why do I need a chain?
Reply: Do you mean, you do it yourself?
Preview
Unable to display preview. Download preview PDF.
Copyright information
© Springer-Verlag Berlin Heidelberg 2009