February 17, 2021 Outline

Reading: text: §9.1–9.2
Due: Homework #3, due February 19


Module 33

  1. Problem with instantiation of Bell-LaPadula Model
    1. Covert channel example: what is “writing”?
    2. Composition of lattices
    3. Principles of autonomy and security
Module 34
  1. Deterministic noninterference
    1. Model of system
    2. Example
    3. Relationship of output to states
    4. Projections and purge functions
Module 35
  1. Alternative definition of security policy
    1. Output-consistent
    2. Security policy
    3. Alternate projection function


UC Davis sigil
Matt Bishop
Office: 2209 Watershed Sciences
Phone: +1 (530) 752-8060
Email: mabishop@ucdavis.edu
ECS 235B, Foundations of Computer and Information Security
Version of February 17, 2021 at 11:19PM

You can also obtain a PDF version of this.

Valid HTML 4.01 Transitional Built with BBEdit Built on a Macintosh