Unformatted text preview:

Review #2The Confinement ProblemTotemKerberosSlide 5Slide 6Slide 7Review #2Jehan-François PârisFall 2004The Confinement Problem•Complete the following sentence:It is much easier to __________________of a covert channel than to eliminate itTotem•What would happen if we removed guaranteed vector messages from Totem architecture?Kerberos•What would be the main advantage and disadvantage of using public keys in Kerberos?The Confinement Problem•Complete the following sentence:It is much easier to limit the bandwidth of a covert channel than to eliminate itTotem•What would happen if we removed guaranteed vector messages from Totem architecture?•Big delays in multiple ring protocolKerberos•What would be the main advantage and disadvantage of using public keys in Kerberos?•Kerberos server will store public keys and would be safer•But user would have to enter impossibly long private


View Full Document

UH COSC 6360 - COSC 6360 Review #2

Documents in this Course
Load more
Download COSC 6360 Review #2
Our administrator received your request to download this document. We will send you the file to your email shortly.
Loading Unlocking...
Login

Join to view COSC 6360 Review #2 and access 3M+ class-specific study document.

or
We will never post anything without your permission.
Don't have an account?
Sign Up

Join to view COSC 6360 Review #2 2 2 and access 3M+ class-specific study document.

or

By creating an account you agree to our Privacy Policy and Terms Of Use

Already a member?