Access Control
Access Control
Access Control
Access Control
Each object can maintain a list, the access control list, of the
access rights of subjects that want to access that object - this
effectively distributes the matrix column-wise, leaving out empty
entries
Of course, capabilities cant be totally maintained by the subjects they must be given to the subjects by some other trusted entity
(like the reference monitor)
Access Matrix
Capability Lists
Protection Domains
Protection Domains
Firewalls
12
Firewalls - Example
Firewalls
14
Much more attention has been paid to the former, because the
latter is in a sense impossible - even if you protect the agent
from tampering with various cryptographic techniques, nothing
prevents a host from simply keeping the agent a prisoner
forever
15
16
Class Loaders
Security Manager
17
20
DDoS
How does a typical DDoS work? How can we protect against them?