The Credential Pattern *

Abstract

Suppose we are building an instant messaging service to be used by members of a university community. Students, teachers and staff of the university may communicate with each other, while outside parties are excluded, perhaps for reasons of privacy. Members of the community may use computers on school grounds, or their own systems, so the client software is… (More)

3 Figures and Tables

Topics

  • Presentations referencing similar topics