Midterm Examination

CSci 555 / Neuman-Obraczka Fall 1998
Directions for completing exam

1. (10 points) RPC semantics.

Using a connection-less transport protocol like UDP, how would you implement at-least-once and at-most-once RPC semantics? Write your answer using pseudo-code.
2. (20 points) File systems. 3. (30 points) Time in distributed systems.
 


4. (40 points)
 

[Warning, you could spend a whole semester answering the following.  I only want you to spend 40 minutes].
Business to consumer electronic commerce has really taken off in the past year but we have seen few changes in the base infrastructure technologies supporting it.  The predominant form of payment is still the transmission of credit cards over SSL protected connections. Customers still find the products they want by browsing from well publicized sites or starting with links they find as the result of queries.

The hot new companies appear to be those that provide a portal for users - starting points to which the users return again and again. Some of these portals provide users with a customizable home page that they can access from multiple places.  Others collect information from the users other "accounts" and present a single interface to this information.  Many provide a place for the user to store persistent data, or data they wish to share with others.  Some provide (in my opinion an insecure) form of single sign on, collecting the users passwords.  One will even provide the user with a free domain name.

One of the problems with such portals is that there are so many of them, and users often end up subscribed to more than one, contrary tothe basic premise (of course each such portal claims the user as their own - since stock valuations seem to be based on these numbers). There are many other problems, and in this question you are asked to list some of these concerns and fix them.

    1. (10 points) What are some of the security vulnerabilities introduced by such portals.  Think about each of the "A"s and "P"s we listed during our security lecture - but only list the ones where you see trouble, and describe the vulnerability.
    2. (10 points) What solutions might you apply to solve some of these problems. Are there any technologies likely to see wider deployment in the coming year that can help.  What vulnerabilities remain that can't be addressed within the portal "model".