Table of contents
- Disclaimer
- WDAI goals
- Hypertext data model
- Centralized hypertext collections
- Centralized hypertext collections (cont'd)
- Distributed hypertext collections
- Distributed hypertext collections (cont'd)
- WDAI design
- Requesting an Authorization Certificate
- Requesting an Authorization Certificate (cont'd)
- Requesting a document
- Requesting a document (cont'd)
- Authorization certificates
- Extended Access Control Lists (EACL)
- Interpreting different security policies
- Conclusions