Are there any interesting dependencies on naming in the security systems described in the readings? For several of the security systems discussed in the readings consider the assertions made about the participants to a transaction? Are these assertions about names, about the entities that are named, the bindings between them, or a combination of the above?
Base your discussion on the readings. Do NOT limit your discussion to systems where the role of naming is obvious.
INSTRUCTION:
The report must be submitted by 11:00 p.m. on October 10th. The report should be approximately 3 pages, or roughly 1200 to 1500 words. To submit your report you will use the DEN Blackboard assignent submission mechanism. You will use this method regardless of whether you are an on-campus student or a DEN student.
It is the individual student's responsibility to follow the submission instruction. Submissions that do not follow this instructions, e.g., submitted late, or only "Saved" and not submitted. may be penalized or may not be graded at all. Note that the submission box for the assignment may dissapear from the class web site at 11PM on October 10th, i.e. the submission deadline.
GUIDELINE:
This is a lot to cover in so few words - so our advice is to write a first pass at your answer that is longer, and then edit out material that is redundant or not to the point. The use of tables can be very effective in conveying your ideas in a small area, but the tables must be integrated with your textual discussion, and not the only item in your submission.