April 2002
Intermediate to advanced
816 pages
20h 56m
English
User- and code-identity–based security are not contradictory, mutually exclusive mechanisms for making a computer secure. In fact, code-identity–based security can be seen as a complement to user-identity–based security in a world of highly interconnected computing. Classical user-identity–based security schemes continue to be crucially important for security decisions in organizations where access rights to computing resources need to mirror the roles and responsibilities users have in that organization. Code-identity–based security is therefore not intended to nor likely to replace user-identity–based security. However, as has been shown, user-identity–based security systems ...