Lecture 20: November 8, 2019
Reading: , §2.3–2.4, 3.1–3.2, 16.
Due: Lab 2, due November 8, 2019; Homework 3, due November 8, 2019
- Greetings and felicitations!
- Puzzle of the Day
- Access Control Matrix
- Commands and conditions: create•file, various flavors of grant•right to show conditions and nested commands
- Copy flag, own rights
- Principle of attenuation of privilege
- Decidability of security
- Notion of leakage in terms of ACM
- Determining security of a generic system with generic rights and mono-operational commands is decidable
- Determining security of a generic system with generic rights is undecidable (HRU result)
- Meaning: can’t derive a generic algorithm; must look at (sets of) individual case
- Access Control Lists
- Full access control lists
- Abbreviations (UNIX method)
- Issues in the way lists work
- Revocation issue
- Capabilities
- Capability-based addressing
- Capabilities as security mechanisms
- Inheritance of C-Lists
\