February 16, 2022 Outline

Reading: text, §9.2–9.5
Assignments: Homework 3, due February 18

Module 40

  1. Deterministic noninterference
    1. Model of system
    2. Example
    3. Relationship of output to states
    4. Projections and purge functions

Module 41

  1. Alternative definition of security policy
    1. Output-consistent
    2. Security policy

Module 42

  1. Alternative definition of security policy
    1. Noninterference-secure with respect to the policy r
  2. Unwinding Theorem
    1. Locally respects
    2. Transition-consistent
    3. Unwinding theorem

Module 42

  1. Access Control Matrix interpretation
    1. Model
    2. ACM conditions
    3. Policy conditions
    4. Result

Module 43

  1. Policies that change over time
    1. Generalization of noninterference

UC Davis sigil
Matt Bishop
Office: 2209 Watershed Sciences
Phone: +1 (530) 752-8060
Email: mabishop@ucdavis.edu
ECS 235B, Foundations of Computer and Information Security
Version of February 16, 2022 at 7:04AM

You can also obtain a PDF version of this.

Valid HTML 4.01 Transitional Built with BBEdit Built on a Macintosh