next up previous
Next: Conclusion Up: Application Example Previous: Service Encapsulation

Further Refinement

The setup presented here makes use of several RC features like compatible roles and program based roles to protect the system and the customers from each other and from client systems.

It can easily be extended by network access control to prevent unwanted connections by customer CGIs or a compromised server program, e.g. to avoid the spreading of worms.

For a complete setup, every single service can be encapsulated with individual roles and types. The focus should certainly lie on the network services.

Amon Ott