security. digital signatures digital signatures using md

9
Security

Upload: william-alexander

Post on 19-Jan-2018

217 views

Category:

Documents


0 download

DESCRIPTION

Digital Signatures Using MD

TRANSCRIPT

Page 1: Security. Digital Signatures Digital Signatures Using MD

Security

Page 2: Security. Digital Signatures Digital Signatures Using MD

Digital Signatures

Page 3: Security. Digital Signatures Digital Signatures Using MD

Digital Signatures Using MD

Page 4: Security. Digital Signatures Digital Signatures Using MD

Authorization/Access Control• Verifying access rights is called access control• Granting access rights is called authorization• Used interchangeably• Subject – Entity that requests access• Object – Entity that is being accessed

Page 5: Security. Digital Signatures Digital Signatures Using MD

General Issues in Access Control

General model of controlling access to objects.

Page 6: Security. Digital Signatures Digital Signatures Using MD

Access Control Matrix• Subject is represented as a row and object as column• M[s, o] indicates the access rights of s on o• Inefficient if large numbers of subjects & objects• Access control lists

– Object maintains a list of all subjects allowed to access it and operations they can perform

• Capabilities– Each subject maintains a list of “rights” on various

objects– Need for making capabilities tamper proof

Page 7: Security. Digital Signatures Digital Signatures Using MD

Access Control Matrix

Comparison between ACLs and capabilities for protecting objects.

a) Using an ACLb) Using

capabilities.

Page 8: Security. Digital Signatures Digital Signatures Using MD

Protection Domains

The hierarchical organization of protection domains as groups of users.

Page 9: Security. Digital Signatures Digital Signatures Using MD

Firewalls

A common implementation of a firewall.