Lec14s Security

of 24
All materials on our website are shared by users. If you have any questions about copyright issues, please report us to resolve them. We are always happy to assist you.
  5 March, 20021 06-06798 Distributed Systems Lecture 14:Security  5 March, 20022 Overview ãWhat is security? –policies and mechanisms–threats and attacks ãSecurity of electronic transactions –secure channels–authentication and cryptography ãSecurity techniques –access control–firewalls–cryptographic algorithms  5 March, 20023 Security ãDefinition –set of measures to guarantee the privacy, integrity andavailability  of resources: ãobjects, databases, servers, processes, channels, etc –involves protection of objects and securing processes and communication channels ãSecurity policies –specify who is authorised to access resources (e.g. fileownership) ãSecurity mechanisms –enforce security policy (e.g. file access control)  5 March, 20024 Security model Object: intended for use by different clients, viaremote invocationPrincipal: authority on whose behalf invocation isissued Access rights Network invocationresultClientServer Principal  (user) Principal  (server) Object
We Need Your Support
Thank you for visiting our website and your interest in our free products and services. We are nonprofit website to share and download documents. To the running of this website, we need your help to support us.

Thanks to everyone for your continued support.

No, Thanks