February 7, 2023 Outline

Reading: text, §8.4–8.5, 9.1–9.2
Due: Homework #2, due February 7; Project Progress Report, due February 14


Note: There will be no class on February 9, 2023 (that’s next Thursday)
  1. Role-based Access Control (RBAC)
    1. Definition of role
    2. Partitioning as job function
    3. Axioms
    4. Containment and other uses
    5. RBAC0, RBAC1, RBAC2, RBAC3

  2. Traducement
    1. Problem of recordation
    2. Requirements of solution
    3. Ideas, entities, and rules
    4. Proposition and theorems
    5. Naming
    6. Validation of model
    7. Consequences
      1. Practice and use
      2. Assumptions

  3. Break-the-glass policies

  4. Problem with instantiation of Bell-LaPadula Model
    1. Covert channel example: what is “writing”?
    2. Composition of lattices
    3. Principles of autonomy and security

  5. Deterministic noninterference
    1. Model of system
    2. Example
    3. Relationship of output to states
    4. Projections and purge functions

UC Davis sigil
Matt Bishop
Office: 2209 Watershed Sciences
Phone: +1 (530) 752-8060
Email: mabishop@ucdavis.edu
ECS 235B, Foundations of Computer and Information Security
Version of February 6, 2023 at 9:26PM

You can also obtain a PDF version of this.

Valid HTML 4.01 Transitional Built with BBEdit Built on a Macintosh