January 6, 2021 Outline

Reading: text, §2, 3.1–3.2
Due: Homework #1, due January 22; Project selection, due January 22


Module 4 (con’t)
  1. Access control matrix and entities
    1. Example: Boolean expressions
    2. Example: History and limiting rights
Module 5
  1. Primitive operations
    1. enter r into A[s, o]
    2. delete r from A[s, o]
    3. create subject s (note that ∀x [ A[s′, x] = A[x, s′] = ∅ ])
    4. create object o (note that ∀x [ A[x, o′] = ∅] )
    5. destroy subject s
    6. destroy object o
Module 6
  1. Commands and examples
    1. Regular command: createfile
    2. Mono-operational command: makeowner
    3. Conditional command: grantrights
    4. Biconditional command: grantreadifrandc
    5. Doing “or” of 2 conditions: grantreadifrorc
    6. General form
Module 7
  1. Miscellaneous points
    1. Copy flag and right
    2. Own as a distinguished right
    3. Principle of attenuation of privilege

UC Davis sigil
Matt Bishop
Office: 2209 Watershed Sciences
Phone: +1 (530) 752-8060
Email: mabishop@ucdavis.edu
ECS 235B, Foundations of Computer and Information Security
Version of January 6, 2021 at 10:54PM

You can also obtain a PDF version of this.

Valid HTML 4.01 Transitional Built with BBEdit Built on a Macintosh