Analyse how trust is used in controlling access to


DQ 1 - Reference monitor and eDirectory products Collapse

Some software vendors are developing eDirectory products, which essentially put all authentication and authorisation functions in one central repository.

The central repository contains a user directory and the access control policy for all applications, such as NT network, Unix machines and databases.

For this Discussion, you will consider the similarities and differences between the reference monitor concept and eDirectory products.

To complete this Discussion:

Post: Compare the reference monitor concept with eDirectory products. Evaluate eDirectory from a security viewpoint and from a point of view of good design. Respond: Respond to your colleagues. Click on the Reply button below to reveal the textbox for entering your message. Then click on the Submit button to post your message.

DQ2 - Trust computation in computer systems Collapse Total views: 19 (Your views: 1). Trusted Computing Group (TCG) has developed the Trusted Computing Platform Architecture (TCPA). Programmers consider it to be a trusted computing base (TCB) development for distributed systems connected over a network.

It actually provides a foundation for building and managing controlled secure environments for running applications and processing (protected) content. For this Discussion, you will review one of the articles in the UoL library that addresses trust computation in computer systems.

To complete this Discussion: Post: Select and summarise an article from the University of Liverpool online library that addresses trust computation in computer systems.

Analyse how trust is used in controlling access to resources. Evaluate the proposed solution used in emergent environments such as BYOD, cloud and pervasive environments.

If you cannot find a suitable article, you can still use any of the references cited in the 'Trust Computation and Quantification' section of this Week's Lecture Notes.

Solution Preview :

Prepared by a verified Expert
Computer Network Security: Analyse how trust is used in controlling access to
Reference No:- TGS01157819

Now Priced at $80 (50% Discount)

Recommended (97%)

Rated (4.9/5)

A

Anonymous user

5/6/2016 2:47:52 AM

The assignment is all about Reference monitor and e-Directory products Collapse. A few software vendors are building up e-Directory products that necessarily place all authentication and authorization functions in one of the central repository. The central repository includes a user directory and the access control policy for all the applications, like NT network, UNIX machines and databases. For this illustration, you will consider the similarities and dissimilarities between the reference monitor theory and e-Directory products. To complete this description part: Differentiate the reference monitor concept by means of e-Directory products. Assess e-Directory from the security point of view and from a viewpoint of good design.