can someone point me to papers written on validation of secure apps based on Kerberos? ________________________________________________ Kerberos mailing list [EMAIL PROTECTED] https://mailman.mit.edu/mailman/listinfo/kerberos
can someone point me to papers written on validation of secure apps based on Kerberos? ________________________________________________ Kerberos mailing list [EMAIL PROTECTED] https://mailman.mit.edu/mailman/listinfo/kerberos