Outline for April 10, 2003

  1. Take-Grant
    1. can·share(r, x, y, G0) iff there is an edge from x to y labelled r in G0, or all of the following hold:
      1. there is a vertex y′ with an edge from y′ to y labelled r;
      2. there is a subject y′′ which terminally spans to y′, or y′′ = y′;
      3. there is a subject x′ which initially spans to x, or x′ = x; and
      4. there is a sequence of islands I1, ..., In connected by bridges for which x′ is in I1 and y′ is in In.
    2. Go through interpretation
    3. can·steal(r, x, y, G0) iff all of the following hold:
      1. there is no edge in G0 from x to y labelled r;
      2. there is a subject x′ which initially spans to x, or x′ = x; and
      3. there is a vertex y′ with an edge labeled r to y in G0 for which can·share(t, x, y′, G0) holds
    4. Present conspiracies
  2. Schematic Protection Model
    1. Model components
    2. Link function
    3. Filter function
    4. Example: Take-Grant as an instance of SPM
    5. Create operations and attenuation

This is also available in Postscript and PDF.