List of Figures
Next:
List of Tables
Up:
Security in Open Systems
Previous:
Contents
List of Figures
Open System Approach.
POSIX OSE Reference Model.
Comparison of Architectures.
X Window System Architecture.
SQL on a standalone system.
SQL with remote login.
SQL with transparent file access.
SQL with the RDA protocol.
Packet-filtering-only firewall.
Dual-homed gateway.
Choke-gate firewall.
Screened subnet firewall.
Message Encryption and Decryption.
Security Services in a Conventional Cryptosystem.
Point-to-Point Environment.
Centralized Management Environment.
Diffie/Hellman Key Exchange.
Key Distribution Using a Certification Authority.
Joint Use of Conventional and Public-key Cryptography.
MHS Functional Model.
MHS Message Structure.
Hierarchical Model for Certification Authorities.
Structure of an entry.
Example of the Directory Information Tree.
Components of the Directory.
Basic ACL.
ACL using collective controls.
A more realistic set of ACLs.
Allowing both READ and SEARCH.
Control of SEARCH filter.
Subtree specifications.
Subtree levels.
Example of hybrid scope of influence.
Example DIT Domain.
Example of full delegation of authority.
Example of partial delegation of authority.
John Barkley
Fri Oct 7 16:17:21 EDT 1994