Se ha denunciado esta presentación.
Utilizamos tu perfil de LinkedIn y tus datos de actividad para personalizar los anuncios y mostrarte publicidad más relevante. Puedes cambiar tus preferencias de publicidad en cualquier momento.

6 security130123

76 visualizaciones

Publicado el

security in RINA

Publicado en: Internet
  • Sé el primero en comentar

  • Sé el primero en recomendar esto

6 security130123

  1. 1. © John Day, 2013 1 Rights Reserved The Pouzin Society Security in RINA IRATI Workshop Barcelona, Spain John Day Lou Chitkushev
  2. 2. © John Day, 2013 2 Rights Reserved The Pouzin Society First a Word on Method •  When trying to work out the IPC Model absolutely no thought was given to security. All of the focus was just understanding the structure. •  People kept asking, What about Security? Is there a security layer? •  Didn’t Know. Hadn’t thought about it. •  There was the obvious: –  The recursion of the layer provided Isolation. –  That only the Application Name and local port-id were exposed to the correspondents. •  Interesting, but hardly an answer •  But it wasn’t the time for those questions . . . •  At least not yet . . .
  3. 3. © John Day, 2013 3 Rights Reserved The Pouzin Society The Recursion Provided Isolation •  Security by isolation, (not obscurity) •  Hosts can not address any element of the ISP. •  No user hacker can compromise ISP assets. •  Unless ISP is physically compromised. ISP Hosts and ISPs do not share DIFS. (ISP may have more layers
  4. 4. © John Day, 2013 4 Rights Reserved The Pouzin Society How Does It Work?