Lecture 20: November 8, 2019

Reading: , §2.3–2.4, 3.1–3.2, 16.
Due: Lab 2, due November 8, 2019; Homework 3, due November 8, 2019


  1. Greetings and felicitations!
  2. Puzzle of the Day
  3. Access Control Matrix
    1. Commands and conditions: create•file, various flavors of grant•right to show conditions and nested commands
    2. Copy flag, own rights
    3. Principle of attenuation of privilege
  4. Decidability of security
    1. Notion of leakage in terms of ACM
    2. Determining security of a generic system with generic rights and mono-operational commands is decidable
    3. Determining security of a generic system with generic rights is undecidable (HRU result)
    4. Meaning: can’t derive a generic algorithm; must look at (sets of) individual case
  5. Access Control Lists
    1. Full access control lists
    2. Abbreviations (UNIX method)
    3. Issues in the way lists work
    4. Revocation issue
  6. Capabilities
    1. Capability-based addressing
    2. Capabilities as security mechanisms
    3. Inheritance of C-Lists
\
UC Davis sigil
Matt Bishop
Office: 2209 Watershed Sciences
Phone: +1 (530) 752-8060
Email: mabishop@ucdavis.edu
ECS 153, Computer Security
Version of November 7, 2019 at 11:22PM

You can also obtain a PDF version of this.

Valid HTML 4.01 Transitional Built with BBEdit Built on a Macintosh