First page Back Continue Last page Overview Graphics
Security Methods
- Physical Separation
- Different processes use difference resources
- Temporal Separation
- Different processes execute at different times
- Logical Separation
- Maintain the illusion of Physical or Temporal Separation
- Cryptographic Separation
- Processes conceal their data and computations so that external processes cannot gain access.
- [ Combinations are possible ]