Map
Index
Random
Help
th

Quote: security violations are: unauthorized release of information, modification of information, and denial of resource usage

topics > all references > references sa-sz > QuoteRef: satyM8_1989 , p. 250



Topic:
security leaks and weaknesses
Topic:
distributed system security

Quotation Skeleton

[The survey of Voydock and Kent [ACM Computing Surveys 15:135-172 1983]] … usage. The security mechanisms in Andrew primarily ensure … is not fully addressed. The complexity of this … with such that it floods the network with … However, it is not clear what Andrew could …   Google-1   Google-2

Copyright clearance needed for quotation.

Additional Titles

Quote: Andrew does not guarantee resource denial; e.g., flooding network with packets has no clear solution

Related Topics up

Topic: security leaks and weaknesses (56 items)
Topic: distributed system security (16 items)

Copyright © 2002-2008 by C. Bradford Barber. All rights reserved.
Thesa is a trademark of C. Bradford Barber.