Abstract
In this final chapter, we briefly review some selected implementations of security services. In particular, we show how basic and composed security mechanisms, as described in the preceding chapters, have been put together to meet the architecture and the requirements of specific applications. Taking suitable abstractions of UNIX, Oracle/SQL, CORBA, Kerberos, SPKI/SDSI and PGP as examples, these applications include an operating system, a database management system, middleware systems, with distributed client-server systems as a special case, and a file and message system.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Rights and permissions
Copyright information
© 2009 Springer-Verlag Berlin Heidelberg
About this chapter
Cite this chapter
(2009). Design of Selected Systems. In: Security in Computing Systems. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-78442-5_17
Download citation
DOI: https://doi.org/10.1007/978-3-540-78442-5_17
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-78441-8
Online ISBN: 978-3-540-78442-5
eBook Packages: Computer ScienceComputer Science (R0)