Distributed Systems

  1. Security in Distributed Systems
    1. Security Fundamentals
      1. Security Goals
        1. Confidentiality
          1. Integrity
            1. Availability
              1. Authentication
                1. Authorization
                  1. Non-repudiation
                  2. Threat Models
                    1. Passive Attacks
                      1. Active Attacks
                        1. Insider Threats
                        2. Security Challenges
                          1. Network Security
                            1. Endpoint Security
                              1. Data Security
                            2. Cryptographic Foundations
                              1. Symmetric Cryptography
                                1. Block Ciphers
                                  1. Stream Ciphers
                                    1. Key Management
                                    2. Asymmetric Cryptography
                                      1. Public Key Systems
                                        1. Digital Signatures
                                          1. Key Exchange
                                          2. Hash Functions
                                            1. Cryptographic Hash Properties
                                              1. Message Authentication Codes
                                                1. Digital Fingerprints
                                              2. Secure Communication
                                                1. Secure Channels
                                                  1. Channel Security Properties
                                                    1. End-to-End Security
                                                      1. Hop-by-Hop Security
                                                      2. Transport Layer Security
                                                        1. TLS Protocol
                                                          1. Handshake Protocol
                                                            1. Record Protocol
                                                              1. Certificate Management
                                                              2. Secure Messaging
                                                                1. Message Encryption
                                                                  1. Message Authentication
                                                                    1. Message Integrity
                                                                  2. Authentication and Authorization
                                                                    1. Authentication Mechanisms
                                                                      1. Password-Based Authentication
                                                                        1. Certificate-Based Authentication
                                                                          1. Biometric Authentication
                                                                            1. Multi-Factor Authentication
                                                                            2. Authentication Protocols
                                                                              1. Challenge-Response Protocols
                                                                                1. Zero-Knowledge Protocols
                                                                                  1. Single Sign-On
                                                                                  2. Authorization Models
                                                                                    1. Access Control Lists
                                                                                      1. Capability-Based Systems
                                                                                        1. Role-Based Access Control
                                                                                          1. Attribute-Based Access Control
                                                                                        2. Key Management
                                                                                          1. Key Distribution
                                                                                            1. Key Distribution Centers
                                                                                              1. Public Key Infrastructure
                                                                                                1. Key Agreement Protocols
                                                                                                2. Key Management Protocols
                                                                                                  1. Needham-Schroeder Protocol
                                                                                                    1. Kerberos Protocol
                                                                                                      1. Diffie-Hellman Key Exchange
                                                                                                      2. Certificate Management
                                                                                                        1. Certificate Authorities
                                                                                                          1. Certificate Revocation
                                                                                                            1. Trust Models
                                                                                                          2. Secure Group Communication
                                                                                                            1. Group Key Management
                                                                                                              1. Centralized Key Distribution
                                                                                                                1. Distributed Key Agreement
                                                                                                                  1. Key Trees
                                                                                                                  2. Secure Multicast
                                                                                                                    1. Group Authentication
                                                                                                                      1. Message Integrity
                                                                                                                        1. Forward Secrecy
                                                                                                                          1. Backward Secrecy