Sicherheit:
Fragen und Lösungsansätze
• redundancy enables one
to infer needed information,
to detect failures and attacks and
to recover from such unfortunate events
• isolation
prevents unwanted information flows or interference
• indistinguishability
makes maliciously planned observations appear random or uniformly expected and thus useless
©2009 Springer-Verlag Berlin Heidelberg / ©2010 Joachim Biskup TU Dortmund / Jan Jürjens : Security in Computing Systems
Key Ideas and Combined Techniques 1