Ce diaporama a bien été signalé.
Nous utilisons votre profil LinkedIn et vos données d’activité pour vous proposer des publicités personnalisées et pertinentes. Vous pouvez changer vos préférences de publicités à tout moment.

6 security130123

67 vues

Publié le

security in RINA

Publié dans : Internet
  • Soyez le premier à commenter

  • Soyez le premier à aimer ceci

6 security130123

  1. 1. © John Day, 2013 1 Rights Reserved The Pouzin Society Security in RINA IRATI Workshop Barcelona, Spain John Day Lou Chitkushev
  2. 2. © John Day, 2013 2 Rights Reserved The Pouzin Society First a Word on Method •  When trying to work out the IPC Model absolutely no thought was given to security. All of the focus was just understanding the structure. •  People kept asking, What about Security? Is there a security layer? •  Didn’t Know. Hadn’t thought about it. •  There was the obvious: –  The recursion of the layer provided Isolation. –  That only the Application Name and local port-id were exposed to the correspondents. •  Interesting, but hardly an answer •  But it wasn’t the time for those questions . . . •  At least not yet . . .
  3. 3. © John Day, 2013 3 Rights Reserved The Pouzin Society The Recursion Provided Isolation •  Security by isolation, (not obscurity) •  Hosts can not address any element of the ISP. •  No user hacker can compromise ISP assets. •  Unless ISP is physically compromised. ISP Hosts and ISPs do not share DIFS. (ISP may have more layers
  4. 4. © John Day, 2013 4 Rights Reserved The Pouzin Society How Does It Work?