Homework #2

Due: February 2, 2024
Points: 100


  1. (15 points) Write a Ponder instance authorization to allow a professor to read an assignment submitted to a drop box between 7:00am and noon.

  2. (25 points) Expand the proof of Theorem 4–2 to show the statement, and the proof, of the induction.

  3. (15 points) Paul needs to read and write some documents. In the following, assume the system security policy is described completely by the Bell-LaPadula model. Note that the situation described may be impossible, in which case you should say so and show why.
    1. Please give the least clearance that Paul can have if he wishes to read a document with classification ( SECRET, { NUC, EUR } ) and a document with classification ( CONFIDENTIAL, { ASI } ).
    2. Please give the greatest clearance that Paul can have if he wishes to write to a document with classification ( TOP SECRET, { EUR } ) and a document with classification ( SECRET, { EUR, NUC } ).
    3. Please give the greatest clearance that Paul must have if he wishes to read a document with classification ( SECRET, { EUR, NUC } ), to write a document with classification ( CONFIDENTIAL, { NUC, EUR } ), and to read another document with classification ( TOP SECRET, { ASIA, EUR } ).

  4. (20 points) Prove Theorem 5–11.

  5. (25 points) Prove or disprove: Theorem 6–1 holds for Biba’s ring policy (described in Section 6.2.2).

UC Davis sigil
Matt Bishop
Office: 2209 Watershed Sciences
Phone: +1 (530) 752-8060
Email: mabishop@ucdavis.edu
ECS 235B, Foundations of Computer and Information Security
Version of January 20, 2024 at 8:55PM

You can also obtain a PDF version of this.

Valid HTML 4.01 Transitional Built with BBEdit Built on a Macintosh