Introduction to Computer Security
COMP 427
- confidentiality
- integrity
- availability
Separation Approaches:
- physical
- spatial
- temporal
- crypto
principles (modularity):
- encapsulation
- abstraction
- layering
- hierarchy
Separation Approaches:
principles (modularity):