ocr: MasterSecunty Tables Network Security Processor Processorz Operating System OperetingSystem Databasel Database Databasen New User Datebasen Password FIGURE 5 Another tributed method system for components controlling direet security access is to to the give each security of the tables. dis- This climinates the exposure of having redundant passwords stored in each pro- cessor, and provides a simple point of control for the entire federation.