Authentication and authorization techniques in distributed systems | IEEE Conference Publication | IEEE Xplore