Outline for January 30, 2002
Reading: §4.1-4.5, §5.1-5.3 (not including §5.2.3, 5.3.1)
-
Greetings and Felicitations!
-
Puzzle of the day
-
Policy
-
Sets of authorized, unauthorized states
-
Secure systems in terms of states
-
Mechanism vs. policy
-
Types of Policies
-
Military/government vs. confidentiality
-
Commercial vs. integrity
-
Types of Access Control
-
Mandatory access control
-
Discretionary access control
-
Originator-controlled access control
-
High-Level Policy Languages
-
Characterization
-
Example: DTEL
-
Low-Level Policy Languages
-
Characterization
-
Example: Tripwire configuration file
-
Goals of Confidentiality Policies
-
Bell-LaPadula Model with Levels Only
-
Security Levels
-
Simple Security Property
-
*-Property
-
Basic Security Theorem
-
Bell-LaPadula Model
-
Compartments
-
BLP as lattice structure
-
Simple Security Property
-
*-Property
-
Basic Security Theorem
-
DG/UX B2 UNIX System
-
Hierarchy of levels
-
Labels, explicit and implicit
-
MAC tuples