<HTML>
<HEAD>
   <META HTTP-EQUIV="Content-Type" CONTENT="text/html; charset=iso-8859-1">
   <META NAME="Author" CONTENT="Mark S. Miller">
   <META NAME="GENERATOR" CONTENT="Mozilla/4.01 [en] (Win95; I) [Netscape]">
   <TITLE>Perimeter Security</TITLE>
</HEAD>
<BODY BACKGROUND="wood.gif">

<CENTER>
<H1>
Defending a Perimeter</H1></CENTER>
&lt;&lt;<A HREF="leakage.html">Leakage</A>&lt;&lt; Up to <A HREF="leakage.html">Leakage
</A>>><A HREF="confinement.html">Confinement</A>>>
<CENTER><IMG SRC="perimeter.gif" HEIGHT=380 WIDTH=561></CENTER>


<P>Alice gives Bob a power that she wishes Mallet not to have.&nbsp; Bob
and Mallet are not supposed to be in communication, and Bob does not wish
to give the power to Mallet.&nbsp; Can Mallet break in and take the power
anyway?&nbsp; Preventing this is the problem of Perimeter Security.
<BR>&nbsp;
<TABLE ALIGN=RIGHT BORDER=4 CELLPADDING=4 >
<TR>
<TD>Operating Systems</TD>

<TD>MMUs</TD>
</TR>

<TR>
<TD>Open Networks</TD>

<TD>Cryptography</TD>
</TR>

<TR>
<TD>Languages</TD>

<TD>Compilers
<BR>Interpreters
<BR>Verifiers</TD>
</TR>

<TR>
<TD>Hardware</TD>

<TD>Tag bits
<BR>Bounds Checks
<BR>etc...</TD>
</TR>
</TABLE>


<P><BR CLEAR=BOTH>

<HR WIDTH="100%">
<TABLE ALIGN=RIGHT BORDER=4 CELLPADDING=4 >
<TR>
<TD>Impenetrable Shields&nbsp;
<CENTER><TABLE BORDER=4 >
<TR>
<TD>Firewalls</TD>

<TD>Applet Sandbox</TD>
</TR>
</TABLE></CENTER>
&nbsp;</TD>
</TR>

<TR>
<TD>Sifting Garbage&nbsp;
<CENTER><TABLE BORDER=4 >
<TR>
<TD>Tempest</TD>

<TD>Timing Attacks</TD>
</TR>
</TABLE></CENTER>
&nbsp;</TD>
</TR>

<TR>
<TD>Rubber Hose&nbsp;
<CENTER><TABLE BORDER=4 >
<TR>
<TD>Smart cards &amp; Microwaves</TD>
</TR>
</TABLE></CENTER>
&nbsp;</TD>
</TR>
</TABLE>
&nbsp;
</BODY>
</HTML>
