Outline for May 24, 2005
-
ORCON
-
Originator controls distribution
-
DAC, MAC inadequate
-
Solution is combination
-
Role-based Access Control (RBAC)
-
Definition of role
-
Partitioning as job function
-
Containment
-
What is a cryptosystem?
-
(M, C, K, D, E)
-
Attacks: known ciphertext, known plaintext, chosen plaintext
-
Classical Ciphers
-
Transposition ciphers
-
Substitution ciphers
-
DES
-
Public-Key Cryptography
-
Properties
-
Diffie-Hellman
-
RSA
-
Cryptographic Hashes
-
Access Control Mechanisms
-
Access control lists
-
Capabilities
-
Locks and Keys
-
Type checking
-
Ring-based access control
-
PACLs
Here is a PDF version of this document.