|6.033 - Computer System Engineering||Handout 15|
In preparation for this lecture, read the second section (pp 6-16 to 6-29) of "The protection of information in computer systems" by Saltzer and Schroeder (#25).
To prepare for recitation read Appendix 6.A from "The protection of information in computer systems" by Saltzer and Schroeder (pp 6-34 to 6-55).
The last lecture on security. No specific reading assignment for today, but you might want to get going on the reading and assignment for tomorrow.
Each year we construct a handout on "Recent Issues Regarding Security and Privacy". This year's handout will be distributed in recitation on March 31. It contains three papers; the first is also available online.
Answer the question below for this week's assignment:
"The Safe-Tcl Security Model" by Ousterhout, Levy, and Welch explains how Safe-Tcl allows different security policies for different applets rather then adopting a single security policy for all applets. Discuss the main benefit and the main risk of Safe-Tcl's approach.
See the course secretary, Neena Lyall, in NE43-523 if you didn't get one.
This lecture begins a new topic of fault-tolerant computing systems. In preparation, read "Chocolate" by Plauger (#27) and "Engineering: history and failure" by Petroski (#26). These two papers are very short, but provide you with some good insights.
The unavoidable price of reliability is simplicity. (C.A.R. Hoare)
|Go to 6.033 Home Page||Questions or Comments: email@example.com|