January 8, 2024 Outline
Reading: text, §1, 2, 20.1.2.2
Due: Homework #1, due January 19; Project selection, due January 21
Module 1
- Introduction to class
- General information
- Homework
- Handouts
Module 2 (Reading: text: §1)
- The basic components of security
Module 3 (Reading: text: §20.1.2.2)
- Reference monitors and security policy
Module 4 (Reading: text: §2)
- Access control matrix and entities
- Subject, objects (includes subjects)
- State is (S, O, A) where A is access control matrix
- Rights (represent abstract notions)
- Instantiating access control matrices
- Example: UNIX file system
- read, write, execute on files
- read, write, execute on directories
- Access control matrix and entities
- Example: Boolean expressions
- Example: History and limiting rights
- Primitive operations
- enter r into A[s, o]
- delete r from A[s, o]
- create subject s (note that ∀ x [ A[s′, x] = A[x, s′] = ∅ ])
- create object o (note that ∀ x [ A[s, o′] = ∅ ])
- destroy subject s
- destroy object o
- Commands and examples
- Regular command: create•file
- Mono-operational command: make•owner
- Conditional command: grant•rights
- Biconditional command: grant•read•if•r•and•c
- Doing “or” of 2 conditions: grant•read•if•r•or•c
- General form
- Miscellaneous points
- Copy flag and right
- Own as a distinguished right
- Principle of attenuation of privilege