Summary

In this chapter, we have examined the nature of security in distributed systems. We have covered authentication and encryption techniques. We have looked at the idea of trust.