Outline for April 17, 2003

  1. Policy
    1. Define security policy, secure system, breach of security formally
    2. Security models
    3. Confidentiality, integrity policies; distinguish from military, commercial policies
    4. Role of trust in modeling
    5. DAC vs. MAC vs. ORCON
    6. Policy languages: high level, low level

This document is also available in Postscript and PDF.