Slides for Lecture for January 25, 2016
Author: Matt Bishop
Given at: UC Davis
Date: January 25, 2016
First slide (slide 1)
Last slide (slide 37)
PDF version
Slide 1: Lecture for January 25, 2016
Slide 2: Example English Policy
Slide 3: Background
Slide 4: Electronic Communications Policy
Slide 5: Use of Electronic Communications
Slide 6: Allowable Uses
Slide 7: Non-Allowable Uses
Slide 8: Privacy, Confidentiality
Slide 9: Privacy, Confidentiality
Slide 10: Limits of Privacy
Slide 11: Security Services, Practices
Slide 12: User Advisories
Slide 13: UC Davis Implementation
Slide 14: UC Davis Implementation
Slide 15: UC Davis Implementation
Slide 16: UC Davis Implementation
Slide 17: Exceptions Allowing Disclosure
Slide 18: Confidentiality Policy
Slide 19: Bell-LaPadula Model, Step 1
Slide 20: Example
Slide 21: Reading Information
Slide 22: Writing Information
Slide 23: Basic Security Theorem, Step 1
Slide 24: Bell-LaPadula Model, Step 2
Slide 25: Levels and Lattices
Slide 26: Levels and Ordering
Slide 27: Reading Information
Slide 28: Writing Information
Slide 29: Basic Security Theorem, Step 2
Slide 30: Problem
Slide 31: Solution
Slide 32: Principle of Tranquility
Slide 33: Types of Tranquility
Slide 34: Declassification Principles
Slide 35: Declassification Principles
Slide 36: Integrity Models
Slide 37: Requirements of Policies