Slides for Lecture for January 22, 2016

Author: Matt Bishop
Given at: UC Davis
Date: January 22, 2016
First slide (slide 1)
Last slide (slide 32)
PDF version

Slide 1: Lecture for January 22, 2016
Slide 2: Overview
Slide 3: Security Policy
Slide 4: Confidentiality
Slide 5: Integrity
Slide 6: Availability
Slide 7: Policy Models
Slide 8: Mechanisms
Slide 9: Question
Slide 10: Answer Part 1
Slide 11: Answer Part #2
Slide 12: Types of Security Policies
Slide 13: Integrity and Transactions
Slide 14: Trust
Slide 15: Trust in Formal Verification
Slide 16: Trust in Formal Methods
Slide 17: Types of Access Control
Slide 18: Policy Languages
Slide 19: High-Level Policy Languages
Slide 20: Example: Ponder
Slide 21: Entities
Slide 22: Authorization Policies
Slide 23: Authorization Policies
Slide 24: Delegation Policies
Slide 25: Information Filtering Policies
Slide 26: Refrain Policies
Slide 27: Obligation Policies
Slide 28: Example
Slide 29: Low-Level Policy Languages
Slide 30: Example: tripwire
Slide 31: Example Database Record
Slide 32: Comments