Outline for May 15, 2006
Reading: text, §16.4.2.5—16.5, 17.1—17.2.1, 33
- Greetings and felicitations!
- Execution-based flow mechanisms
- Variable classes
- Examples
- Security pipeline interface
- Secure network server mail guard
- Confinement problem
- What it is
- Covert channels
- Rule of transitive confinement
- Difficulty of preventing leaking
- Isolation: virtual machines
- What it is
Version of May 15, 2006 at 1:02 PM
You can also obtain a PDF version of this.