3c. Security and Resource Mgmt.
•Q:
Can untrusted users program the network?
–Need
to isolate services and protect network
–
•A:
Partly. This is difficult!
–Requires
Protection
•My
program can’t corrupt your program à Solved
–Requires
Resource Management
•My
program can’t starve yours à Not solved