Talk:Authentication
From Erights
(Difference between revisions)
(How can the wiki page be further improved.) |
|||
Line 1: | Line 1: | ||
How can this page be improved: | How can this page be improved: | ||
* If we miss some important relationship between authentication and other concepts, notes about those relationship can be added here. | * If we miss some important relationship between authentication and other concepts, notes about those relationship can be added here. | ||
- | * More examples can be added. | + | * More examples can be added. At each example we should say (if it is not clear): |
+ | ** The set of possible principals at each end of the communication channel. | ||
+ | ** What kind of information flows through the communication channel. | ||
+ | ** Why authentication is useful in a particular case. | ||
[[User:Kosik|Kosik]] 01:15, 30 July 2009 (CDT) | [[User:Kosik|Kosik]] 01:15, 30 July 2009 (CDT) |
Latest revision as of 06:29, 30 July 2009
How can this page be improved:
- If we miss some important relationship between authentication and other concepts, notes about those relationship can be added here.
- More examples can be added. At each example we should say (if it is not clear):
- The set of possible principals at each end of the communication channel.
- What kind of information flows through the communication channel.
- Why authentication is useful in a particular case.
Kosik 01:15, 30 July 2009 (CDT)