Download presentation
Presentation is loading. Please wait.
Published byWilliam Alexander Modified over 8 years ago
1
Security
2
Digital Signatures
3
Digital Signatures Using MD
4
Authorization/Access Control Verifying access rights is called access control Granting access rights is called authorization Used interchangeably Subject – Entity that requests access Object – Entity that is being accessed
5
General Issues in Access Control General model of controlling access to objects.
6
Access Control Matrix Subject is represented as a row and object as column M[s, o] indicates the access rights of s on o Inefficient if large numbers of subjects & objects Access control lists –Object maintains a list of all subjects allowed to access it and operations they can perform Capabilities –Each subject maintains a list of “rights” on various objects –Need for making capabilities tamper proof
7
Access Control Matrix Comparison between ACLs and capabilities for protecting objects. a)Using an ACL b)Using capabilities.
8
Protection Domains The hierarchical organization of protection domains as groups of users.
9
Firewalls A common implementation of a firewall.
Similar presentations
© 2024 SlidePlayer.com Inc.
All rights reserved.