Reference no: EM13872420
DQ 1 - Reference monitor and eDirectory products Collapse
Some software vendors are developing eDirectory products, which essentially put all authentication and authorisation functions in one central repository.
The central repository contains a user directory and the access control policy for all applications, such as NT network, Unix machines and databases.
For this Discussion, you will consider the similarities and differences between the reference monitor concept and eDirectory products.
To complete this Discussion:
Post: Compare the reference monitor concept with eDirectory products. Evaluate eDirectory from a security viewpoint and from a point of view of good design. Respond: Respond to your colleagues. Click on the Reply button below to reveal the textbox for entering your message. Then click on the Submit button to post your message.
DQ2 - Trust computation in computer systems Collapse Total views: 19 (Your views: 1). Trusted Computing Group (TCG) has developed the Trusted Computing Platform Architecture (TCPA). Programmers consider it to be a trusted computing base (TCB) development for distributed systems connected over a network.
It actually provides a foundation for building and managing controlled secure environments for running applications and processing (protected) content. For this Discussion, you will review one of the articles in the UoL library that addresses trust computation in computer systems.
To complete this Discussion: Post: Select and summarise an article from the University of Liverpool online library that addresses trust computation in computer systems.
Analyse how trust is used in controlling access to resources. Evaluate the proposed solution used in emergent environments such as BYOD, cloud and pervasive environments.
If you cannot find a suitable article, you can still use any of the references cited in the 'Trust Computation and Quantification' section of this Week's Lecture Notes.