Fall 2013

Paper Reading Questions

For each paper, your assignment is two-fold. By 10PM the evening before lecture:

  • Submit your answer for each lecture's paper question via the submission web site in a file named lecn.txt, and
  • Submit your own question about the paper (e.g., what you find most confusing about the paper or the paper's general context/problem) in a file named qn.txt. You cannot use the question below. To the extent possible, during lecture we will try to answer questions submitted the evening before.

Lecture 15

Based on the different schemes described in the paper, what do you think would be a reasonable choice for authenticating users in the following scenarios, and what trade-offs would you have to make:

  1. Logging in to a public Athena machine in a cluster.
  2. Checking your balance on a bank's web site via HTTPS from a private laptop.
  3. Accessing Facebook from an Internet cafe.
  4. Withdrawing cash from an ATM.

Questions or comments regarding 6.858? Send e-mail to the course staff at 6.858-staff@pdos.csail.mit.edu.

Top // 6.858 home // Last updated Friday, 29-Jan-2016 11:49:50 EST