- From: Peter J Churchyard <pjc@trusted.com>
- Date: Wed, 21 Feb 1996 09:27:57 -0500 (EST)
- To: Paul Leach <paulle@microsoft.com>
- Cc: fielding@avron.ICS.UCI.EDU, http-wg%cuckoo.hpl.hp.com@hplb.hpl.hp.com
Here are some requirements that I am asked to provide today... An authentication scheme that can be implemented in a proxy to tie in a user to a request that is strong enough that if the user breaks the company rules then the employee can be dismissed. That is I need auth that can be demonstrated in a court of law as being "spoof proof" Can we do it? Pete. -- The TIS Network Security Products Group has moved! voice: 301-527-9500 x123 fax: 301-527-0482 2277 Research Boulevard, 5th Floor, Rockville, MD 20850
Received on Wednesday, 21 February 1996 06:32:23 UTC