### Lessons
1. [[What is different in securing Distributed Systems?]]
2. [[What is different in securing Distributed Systems?#Example scenario|An Example: Entities involved in an access request]]
3. [[Principles and statements in distributed systems security|Principals and Statements]]
4. [[Principles and statements in distributed systems security#Which statements are valid?|What statements are valid?]]
5. Granting Requests: An Example
6. Secure Communication Channels
7. Sharing Keys
8. Diffie-Hellman Key Exchange
9. Named Principals and Certificates
10. Certificate Revocation and Distributed Trust
### Readings
- [Authentication in Distributed Systems: Theory and Practice](https://www.cs.utexas.edu/~shmat/courses/cs380s/lampson92.pdf)