Lecture 18 -Confidentiality, Authorization, and Protocols


by Tristan Vuong


Access Control List


An access control list is way of controlling access to an object.
One version of an access control list is a role based access control list.
For example, in the NASDAQ there are levels of access. A broker can only view
quotes. A dealer can view and change quotes. It can also be something like
a school system. Instructors can view and change grades. Students can only
view them.


Capabilities


Capabilities are a different form of access control



Cloud Computing


Cloud computing allows for users to access shared resources made available
from a computer infrastructure through the use of virtual machines on a browser.

Security is a potential problem with public clouds:

Possible solutions:

Other problems with cloud computing:


Trusting a Virtual Machine


Ken Thompson described a method to break into Unix