Suppose that the operations of the BLOB object are separated into two categories – public operations that are available to all users and protected operations that are available only to certain named users. State all of the problems involved in ensuring that only the named users can use a protected operation. Supposing that access to a protected operation provides information that should not be revealed to all users, what further problems arise?
What will be an ideal response?
Each request to access a protected operation must include the identity of the user making the request. The problems are:
• defining the identities of the users. Using these identities in the list of users who are allowed to access the protected operations at the implementation of the BLOB object. And in the request messages.
• ensuring that the identity supplied comes from the user it purports to be and not some other user pretending to be that user.
• preventing other users from replaying or tampering with the request messages of legitimate users. Further problems.
• the information returned as the result of a protected operation must be hidden from unauthorised users.
This means that the messages containing the information must be encrypted in case they are intercepted by unauthorised users.
You might also like to view...
A call to a C++ function is
a. The name of the function followed by empty parentheses. b. The name of the function followed by any number of arguments, regardless of the number of parameters in the definition. c. The name of the function followed by a number of arguments not greater than the number of parameters in the definition. d. The name of the function followed by exactly the number of arguments as there are parameters in the definition. e. The name of the function only.
Write a Java application that loads an XML document that contains the DTD in Fig. 8.19 as part of its internal subset. Use the XML document’s data to draw rectangles and circles with text inside them. Attributes x and y represent the top-left coordinates. Assume a circle is bounded by an imaginary rectangle. Attributes width and height represent the rectangle’s width and height and attribute radius is the circle’s radius. Validate your XML document(s) against the DTD.
What will be an ideal response?
You should add the static keyword in the place of ? in which of the following function:
```
#include
In writing several different research papers, if you cite the same source multiple times, it is not necessary to enter the source information more than once into Microsoft Word
Indicate whether the statement is true or false