Lecture 18 -Confidentiality, Authorization, and Protocols
by Tristan Vuong
Access Control List
An access control list is way of controlling access to an object.
One version of an access control list is a role based access control list.
For example, in the NASDAQ there are levels of access. A broker can only view
quotes. A dealer can view and change quotes. It can also be something like
a school system. Instructors can view and change grades. Students can only
view them.
Capabilities
Capabilities are a different form of access control
Cloud Computing
Cloud computing allows for users to access shared resources made available
from a computer infrastructure through the use of virtual machines on a browser.
Security is a potential problem with public clouds:
Possible solutions:
Other problems with cloud computing:
Trusting a Virtual Machine
Ken Thompson described a method to break into Unix