Review #2The Confinement ProblemTotemKerberosSlide 5Slide 6Slide 7Review #2Jehan-François PârisFall 2004The Confinement Problem•Complete the following sentence:It is much easier to __________________of a covert channel than to eliminate itTotem•What would happen if we removed guaranteed vector messages from Totem architecture?Kerberos•What would be the main advantage and disadvantage of using public keys in Kerberos?The Confinement Problem•Complete the following sentence:It is much easier to limit the bandwidth of a covert channel than to eliminate itTotem•What would happen if we removed guaranteed vector messages from Totem architecture?•Big delays in multiple ring protocolKerberos•What would be the main advantage and disadvantage of using public keys in Kerberos?•Kerberos server will store public keys and would be safer•But user would have to enter impossibly long private
View Full Document