Security needs (contd.)
Protect against delay attacks for time-critical applications
Protect against message tampering
Secure billing systems
Tiered security
“Orange book” - style security?
Security vs simplicity
Previous slide
Next slide
Back to first slide
View graphic version