icos-6----Page:7
1
2
3
4
5
6
7
8
Conclusion
It seems reasonable to think about associating
network access authentication and authorization with
QoS signaling
You might call it bootstrapping, key distribution, ….
PPT Version