Lecture 2 Outline

Reading: text, §2


  1. Greetings and felicitations!
  2. Access Control Matrix
    1. Subjects, objects, and rights
    2. Primitive commands
    3. Commands and conditions: create-file, various flavors of grant-right to show conditions and nested commands
  3. Decidability of security
    1. Notion of leakage in terms of ACM
    2. Determining security of a generic system with generic rights and mono-operational commands is decidable
    3. Determining security of a generic system with generic rights is undecidable (HRU result)
    4. Meaning: can’t derive a generic algorithm; must look at (sets of) individual case


You can also obtain a PDF version of this. Version of September 22, 2016 at 7:40PM