icos-6----Page:7
1  2  3  4  5  6  7  8 

Conclusion
It seems reasonable to think about associating
network access authentication and authorization with
QoS signaling
You might call it bootstrapping, key distribution, ….
PPT Version