1 | Access to protected resource is controlled by PAC and by an Access Control List (ACL) similar to the NPAC Grading System. |
2 | PAC protection is provided by temporary secret cryptographic keys shared pairwise between the participants. |
3 | SESAME supports Certification Authorities, X.509 Directory user certificates. |
4 | SESAME supports delegation, i.e., an application act on user's behalf. |
5 | SESAME security structure is explained at |
6 | http://www.esat.kuleuven.ac.be/cosic/sesame/relat/ecma-219.ps.Z |