Diese Präsentation wurde erfolgreich gemeldet.
Wir verwenden Ihre LinkedIn Profilangaben und Informationen zu Ihren Aktivitäten, um Anzeigen zu personalisieren und Ihnen relevantere Inhalte anzuzeigen. Sie können Ihre Anzeigeneinstellungen jederzeit ändern.
© John Day, 2013 1	

Rights Reserved	

The Pouzin Society	

Security in RINA	

IRATI Workshop	

Barcelona, Spain	

John Da...
© John Day, 2013 2	

Rights Reserved	

The Pouzin Society	

First a Word on Method	

•  When trying to work out the IPC Mo...
© John Day, 2013 3	

Rights Reserved	

The Pouzin Society	

The Recursion Provided Isolation	

•  Security by isolation, (...
© John Day, 2013 4	

Rights Reserved	

The Pouzin Society	

How Does It Work?
6 security130123
6 security130123
6 security130123
6 security130123
6 security130123
6 security130123
6 security130123
6 security130123
6 security130123
6 security130123
6 security130123
6 security130123
6 security130123
6 security130123
6 security130123
Nächste SlideShare
Wird geladen in …5
×

6 security130123

384 Aufrufe

Veröffentlicht am

RINA Workshop 3

Veröffentlicht in: Internet
  • Als Erste(r) kommentieren

  • Gehören Sie zu den Ersten, denen das gefällt!

6 security130123

  1. 1. © John Day, 2013 1 Rights Reserved The Pouzin Society Security in RINA IRATI Workshop Barcelona, Spain John Day Lou Chitkushev
  2. 2. © John Day, 2013 2 Rights Reserved The Pouzin Society First a Word on Method •  When trying to work out the IPC Model absolutely no thought was given to security. All of the focus was just understanding the structure. •  People kept asking, What about Security? Is there a security layer? •  Didn’t Know. Hadn’t thought about it. •  There was the obvious: –  The recursion of the layer provided Isolation. –  That only the Application Name and local port-id were exposed to the correspondents. •  Interesting, but hardly an answer •  But it wasn’t the time for those questions . . . •  At least not yet . . .
  3. 3. © John Day, 2013 3 Rights Reserved The Pouzin Society The Recursion Provided Isolation •  Security by isolation, (not obscurity) •  Hosts can not address any element of the ISP. •  No user hacker can compromise ISP assets. •  Unless ISP is physically compromised. ISP Hosts and ISPs do not share DIFS. (ISP may have more layers
  4. 4. © John Day, 2013 4 Rights Reserved The Pouzin Society How Does It Work?

×