February 16, 2024 Outline

Reading: text, §8.5, 9.1–9.2
Due: Project Progress Report, due February 16; Homework #3, due February 21
   Extra Credit #D, due February 23

Module 32 (Reading: [WB04])1

  1. Traducement
    1. Problem of recordation
    2. Requirements of solution
    3. Ideas, entities, and rules
    4. Proposition and theorems
    5. Naming
    6. Validation of model
    7. Consequences
      1. Practice and use
      2. Assumptions

Module 33 (Reading: text, §8.5)

  1. Break-the-glass policies

Module 34 (Reading: text, §9.1)

  1. Problem with instantiation of Bell-LaPadula Model
    1. Covert channel example: what is “writing”?
    2. Composition of lattices
    3. Principles of autonomy and security

Module 35 (Reading: text, §9.2)

  1. Deterministic noninterference
    1. Model of system
    2. Example
    3. Relationship of output to states
    4. Projections and purge functions

Footnotes

  1. See the handout page in Canvas

UC Davis sigil
Matt Bishop
Office: 2209 Watershed Sciences
Phone: +1 (530) 752-8060
Email: mabishop@ucdavis.edu
ECS 235B, Foundations of Computer and Information Security
Version of February 15, 2024 at 10:26PM

You can also obtain a PDF version of this.

Valid HTML 4.01 Transitional Built with BBEdit Built on a Macintosh