February 10, 2021 Outline

Reading: text: , §8.4–8.5
Due: Project progress report, due February 12; Homework #3, due February 19


Module 29
  1. ORCON
    1. Examples of DRM (including how not to do it!)
Module 30
  1. Role-based Access Control (RBAC)
    1. Definition of role
    2. Partitioning as job function
    3. Axioms
    4. Containment and other uses
    5. RBAC0, RBAC1, RBAC2, RBAC3
Module 31
  1. Traducement (see paper traduce.pdf)
    1. Problem of recordation
    2. Requirements of solution


UC Davis sigil
Matt Bishop
Office: 2209 Watershed Sciences
Phone: +1 (530) 752-8060
Email: mabishop@ucdavis.edu
ECS 235B, Foundations of Computer and Information Security
Version of February 9, 2021 at 11:46AM

You can also obtain a PDF version of this.

Valid HTML 4.01 Transitional Built with BBEdit Built on a Macintosh