Due Before Class: 06/18/08. No Late Submissions Please

Due Before Class: 06/18/08. No Late Submissions Please

<p>ISA 662, Fall 2006, Assignment 1</p><p>Due before class: 06/18/08. No late submissions please. </p><p>Please submit electronic copy to: [email protected] with subject line “ISA562 HM1”</p><p>Prof. Edgar H. Sibley </p><p>This is an individual assignment. You are required to solve it on your own using whatever material you like. Please sign and submit the following honor code statement with your solution: I have not taken any help on this examination from anyone and not provided any help to anyone. The solution has been entirely worked out by me and represents my individual effort. Please submit a typed solution with the signed honor code statement. </p><p>For each of the following concepts, research the internet for information on the topic and provide a 1/2 page to one page brief essay explaining: (a) what the concept means, (b) how is it realized mathematically, and (c) what are its practical benefits. Identify the source(s) for your information. </p><p> i. Blind signatures ii. Identity-based encryption iii. Threshold cryptography iv. Key escrow</p><p>Guideline: Your answer should clearly explain the concept along the three aspects identified above to any of your classmates who did not undertake this exercise themselves</p><p>2. (Problem 9, Chapter 1 (pag.26) in M.Bishop’s, Computer Security) Policy restricts the use of electronic mail on a particular system to faculty and staff. Students cannot send or receive electronic mail on that host. Classify the following mechanisms as secure, precise, or broad. </p><p> o The electronic mail sending and receiving programs are disabled. o As each letter is sent or received, the system looks up the sender (or recipient) in a database. If that party is listed as faculty or staff, the mail is processed. Otherwise, it is rejected. (Assume the database entries are correct.) o The electronic mail sending programs ask the user if he or she is a student. If so, the mail is refused. The electronic mail receiving programs are disabled.</p><p>3. Alice can read and write the file x, can read the file y, and can execute the file z. Bob can read x, can read and write y, and cannot access z. o Write a set of access control lists for this situation. Which list is associated with which file? o Write a set of capability lists for this situation, and say what each list is associated with. </p>

View Full Text

Details

  • File Type
    pdf
  • Upload Time
    -
  • Content Languages
    English
  • Upload User
    Anonymous/Not logged-in
  • File Pages
    2 Page
  • File Size
    -

Download

Channel Download Status
Express Download Enable

Copyright

We respect the copyrights and intellectual property rights of all users. All uploaded documents are either original works of the uploader or authorized works of the rightful owners.

  • Not to be reproduced or distributed without explicit permission.
  • Not used for commercial purposes outside of approved use cases.
  • Not used to infringe on the rights of the original creators.
  • If you believe any content infringes your copyright, please contact us immediately.

Support

For help with questions, suggestions, or problems, please contact us