Building a trusted computing base
Access Control: Role/Identity based
89.
Policy Enforcement
90.
Policy Definition Problems
91.
Identity based vs. code based policies
92.
Code Signing