8. Conclusions and Outlook 1/2
- Both Kerberos- and PKI-based AAIs are well suited to meet the requirements of contemporary and future applications
- At first sight, the technologies look fundamentally different
- However, the differences are mainly caused by authenti-cation
- With regard to authorization, the technologies are similar in spirit and use comparable constructs (i.e., (P)ACs)
- There is a possibility that the technologies converge in the long term
- In the short- and medium-term, however, it is possible and very likely that we will see different (and not interoperable) AAIs