Outline for May 24, 2005

  1. ORCON
    1. Originator controls distribution
    2. DAC, MAC inadequate
    3. Solution is combination
  2. Role-based Access Control (RBAC)
    1. Definition of role
    2. Partitioning as job function
    3. Containment
  3. What is a cryptosystem?
    1. (M, C, K, D, E)
    2. Attacks: known ciphertext, known plaintext, chosen plaintext
  4. Classical Ciphers
    1. Transposition ciphers
    2. Substitution ciphers
    3. DES
  5. Public-Key Cryptography
    1. Properties
    2. Diffie-Hellman
    3. RSA
  6. Cryptographic Hashes
  7. Access Control Mechanisms
    1. Access control lists
    2. Capabilities
    3. Locks and Keys
    4. Type checking
    5. Ring-based access control
    6. PACLs


Here is a PDF version of this document.