Table of ContentsOperating System vs. Network Security Security: The Goal Real-World Security Dangers Vulnerabilities Defensive strategies The Access Control Model Mechanisms Levels of Security Why We Don’t Have “Real” Security Operating System Security NT Domain Security Distributed Systems Are Different Web Server Security Today Web Browser Security Today Principals What Principals Do Secure Channel Speaks For Secure Channels via Encryption Authorization with ACLs Names and Name Spaces: SDSI/SPKI Authenticating a Channel Checking Access What about OS? Groups and Group Credentials Authenticating Systems Auditing Implement: Tools and Assurance References |
Author: Butler Lampson |