Notes for January 30, 1998
- Greetings and felicitations!
- Reading: Pfleeger, pp.228-253; Garfinkel & Spafford, pp. 71-137
- Puzzle
- You need to tell the author of the software about it, or report it to the
vendor.
- Biometrics
- Depend on physical characteristics
- Examples: pattern of typing (remarkably effective), retinal scans,
etc.
- Location
- Bind user to some location detection device (human, GPS)
- Authenticate by location of the device
- Notion of "privilege"
- Identity
- Functionality
- Granularity
- Privilege in OSes
- None (original IBM OS; protect with password, or anyone can read it)
- Fence, base and bounds registers; relocation
- Tagged architectures
- Memory management based schemes: segmentation, paging, and paged
segmentation
[ ended here ]
- User identification
- Go through UNIX idea of "real", "effective", "saved", "audit"
- Go through notion of "role" accounts; cite Secure Xenix, DG, etc.
- Go through PPNs (TOPS-10) and groups
- Review least privilege
- Privilege in Languages
- Nesting program units
- Temporary upgrading of privileges
- Different forms of access control
- UNIX method
- ACLs: describe, revocation issue
- MULTICS rings: (b1, b2) access bracket - can access freely; (b2, b3) call
bracket - can call segment through gate; so (4, 6, 9) as example
- Capabilities: file descriptors in UNIX
You can also see this document
in its native format,
in Postscript,
in PDF,
or
in ASCII text.
Send email to
cs153@csif.cs.ucdavis.edu.
Department of Computer Science
University of California at Davis
Davis, CA 95616-8562
Page last modified on 2/14/98