ECE579SComputerSecurity6AccessControlRevisited,.ppt

ECE579SComputerSecurity6AccessControlRevisited,.ppt

ECE579S Computer Security 6: Access Control Revisited, IPSec Profssor Richard A. Stanley, P.E. Summary of Access Control It’s all about protection Identification ties a physical entity to an abstract identity Authentication verifies the identity of both entities: the user and the computer Policy and audit trails are critical No shortage of folks trying to break in Perspective Computer security field is relatively new Most of the key contributors to the theory are still practicing professionals LaPadula at MITRE in MA Bell consulting in VA Lipner at Microsoft in Redmond, WA Ken Biba is

文档评论(0)

1亿VIP精品文档

相关文档