8.1. Scenarios and security requirements

As a focus for the discussion we describe some common scenarios and discuss the range of security requirements that might be associated with them. We then go on to list the various styles of threat. A system design should have an associated risk analysis where the designers' assumptions of the risks to the system are stated, together with whether they are countered in the design. It should be clear which threats a system is supposed to be able to withstand and which are not addressed.

8.1.1. Client–server interactions

A principal invokes a service. This may be in order to access some object which is managed by the service but to which the principal may have access rights. The service must authorize the ...

Get Operating Systems: Concurrent and Distributed Software Design now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.