In this chapter, several lines of reasoning are brought together in order to outline and justify the elements of an exemplary security architecture that is based on the techniques of control and monitoring. In fact, this architecture also includes two other techniques sketched in Chapter 7, namely (the basic usage of) cryptography and the amalgam called certificates and credentials. The relevant reasonings consider mainly the abstract design of the three techniques; basic technical enforcement mechanisms for achieving isolation and, to a minor extent, redundancy and indistinguishability; the basic vulnerabilities of computing systems; and the need for establishing trust.
CITATION STYLE
Elements of a Security Architecture. (2008). In Security in Computing Systems (pp. 303–354). Springer Berlin Heidelberg. https://doi.org/10.1007/978-3-540-78442-5_10
Mendeley helps you to discover research relevant for your work.