rddp-5----Page:5
1  2  3  4  5  6  7  8  9  10  11  12  13  14  15  16  17  18  19  20 

Functional Components
Privileged application
Assumed to not intentionally attack the system, but may be greedy for resources
Non-privileged application
Desire to provide benefits of RDMAP/DDP without introducing additional security risk
Not trusted, granted only a subset of the capabilities granted to a privileged application
Resource Manager
Controls allocation of “scarce” resources
Implements policies to detect and prevent DoS attacks
PPT Version