Outline for February 1, 2006

Reading: text, §2, 3.1–3.2, 4.1–4.3

  1. Greetings and felicitations!
    1. Puzzle of the day
  2. Access Control Matrix
    1. Commands and conditions: create-file, various flavors of grant-right to show conditions and nested commands
    2. Copy flag
    3. Attenuation of privileges
  3. HRU Result
    1. Notion of leakage in terms of ACM
    2. Determining security of a generic system with generic rights and monooperational commands is decidable
    3. Determining security of a generic system with generic rights is undecidable
    4. Meaning: can't derive a generic algorithm; must look at (sets of) individual case
  4. Policy
    1. Sets of authorized, unauthorized states
    2. Secure systems in terms of states
    3. Mechanism vs. policy
  5. Types of Policies
    1. Military/government vs. confidentiality
    2. Commercial vs. integrity

Version of February 2, 2006 at 2:40PM
You can also obtain a PDF version of this.