### Lessons 1. [[What is different in securing Distributed Systems?]] 2. [[What is different in securing Distributed Systems?#Example scenario|An Example: Entities involved in an access request]] 3. [[Principles and statements in distributed systems security|Principals and Statements]] 4. [[Principles and statements in distributed systems security#Which statements are valid?|What statements are valid?]] 5. Granting Requests: An Example  6. Secure Communication Channels  7. Sharing Keys  8. Diffie-Hellman Key Exchange  9. Named Principals and Certificates  10. Certificate Revocation and Distributed Trust ### Readings - [Authentication in Distributed Systems: Theory and Practice](https://www.cs.utexas.edu/~shmat/courses/cs380s/lampson92.pdf)