A. For each of the two required reading, 1. Write a one-paragraph summary of the paper. 2. Comment on one thing you think is particularly worth noting and/or discussing about the paper. B. SFI is an example of reference monitoring where a security policy is enforced runtime by a piece of code (the reference monitor). Give another three examples of reference monitoring in computer systems and networks. For each example, explain what the reference monitor is and what security policy is being enforced.