Outline for May 15, 2006

Reading: text, §16.4.2.5—16.5, 17.1—17.2.1, 33

  1. Greetings and felicitations!
  2. Execution-based flow mechanisms
    1. Variable classes
  3. Examples
    1. Security pipeline interface
    2. Secure network server mail guard
  4. Confinement problem
    1. What it is
    2. Covert channels
    3. Rule of transitive confinement
    4. Difficulty of preventing leaking
  5. Isolation: virtual machines
    1. What it is

Version of May 15, 2006 at 1:02 PM

You can also obtain a PDF version of this.