January 7, 2022 Outline

Reading: text, §3.3–3.7
Due: Homework #1, due January 19; Project Selection, due January 21


Module 8
  1. Model Interpretation
    1. ACM very general, broadly applicable; Take-Grant more specific, can model fewer situations
    2. Example: shared buffer managed by trusted third party
Module 9
  1. can•steal(r, x, y, G0) definition and theorem
  2. Conspiracy
    1. What is of interest?
    2. Access, deletion sets
    3. Conspiracy graph
    4. Number of conspirators
Module 10
  1. Schematic Protection Model
    1. Protection type, ticket, function, link predicate, filter function
    2. Take-Grant as an instance of SPM
    3. Create rules and attenuation

UC Davis sigil
Matt Bishop
Office: 2209 Watershed Sciences
Phone: +1 (530) 752-8060
Email: mabishop@ucdavis.edu
ECS 235B, Foundations of Computer and Information Security
Version of January 10, 2022 at 11:35PM

You can also obtain a PDF version of this.

Valid HTML 4.01 Transitional Built with BBEdit Built on a Macintosh