Notes for March 3, 1997
-
Hello
-
Puzzle of the day
-
Harden the systems.
-
Call his mother.
-
ISA threat model
-
disclosure (snooping)
-
modification
-
masquerade
-
delay
-
denial of service
-
replay
-
denial of receipt
-
repudiation
-
Kerberos
-
Needham-Schroeder secret-key protocol
-
Denning-Sacco augmentation
-
Kerberos implementation
You can also see this document as a
Binhex Framemaker version 5 document,
Postscript document,
or a
plain ASCII text document.
Send email to
cs153@csif.cs.ucdavis.edu.
Department of Computer Science
University of California at Davis
Davis, CA 95616-8562
Page last modified on 3/9/97