22.12.2012 Views

Front cover - IBM Redbooks

Front cover - IBM Redbooks

Front cover - IBM Redbooks

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Figure 2-15 Three-tier client/server input flow with security subsystems<br />

82 Lotus Security Handbook<br />

Several instances of security subsystems are depicted, spread among three<br />

network security domains. An information flow control subsystem is positioned at<br />

the boundary points between networks. An access control subsystem is<br />

positioned between a receiving component and its corresponding application<br />

component. Interfaces to related credential subsystems and security audit<br />

subsystems are shown in the security subsystem logic view. No integrity<br />

subsystem functions are referenced in this example. The scenario follows:<br />

1. The business process interface is invoked by a user or a process and the<br />

request is transferred via a sending component.<br />

2. The request flows across a security domain in a manner that is acceptable to<br />

the sending and receiving components, based upon the defined information<br />

flow control rules.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!