Slides for Lecture for January 27, 2016
Author: Matt Bishop
Given at: UC Davis
Date: January 27, 2016
First slide (slide 1)
Last slide (slide 41)
PDF version
Slide 1: Lecture for January 27, 2016
Slide 2: Integrity Models
Slide 3: Requirements of Policies
Slide 4: Biba Integrity Model
Slide 5: Intuition for Integrity Levels
Slide 6: Information Flow and Model
Slide 7: Strict Integrity Policy
Slide 8: LOCUS and Biba
Slide 9: Clark-Wilson Integrity Model
Slide 10: Entities
Slide 11: Certification Rules 1 and 2
Slide 12: Enforcement Rules 1 and 2
Slide 13: Users and Rules
Slide 14: Logging
Slide 15: Handling Untrusted Input
Slide 16: Separation of Duty In Model
Slide 17: Comparison With Requirements
Slide 18: Comparison With Requirements
Slide 19: Comparison to Biba
Slide 20: UNIX Implementation
Slide 21: CDI Arrangement
Slide 22: Examples
Slide 23: Problems
Slide 24: Key Points
Slide 25: Cryptography Overview
Slide 26: Cryptosystem
Slide 27: Example
Slide 28: Attacks
Slide 29: Basis for Attacks
Slide 30: Classical Cryptography
Slide 31: Transposition Cipher
Slide 32: Attacking the Cipher
Slide 33: Example
Slide 34: Example
Slide 35: Substitution Ciphers
Slide 36: Attacking the Cipher
Slide 37: Statistical Attack
Slide 38: Character Frequencies
Slide 39: Statistical Analysis
Slide 40: Correlation:
\loch\af1\dbch\f2\fs88\cf1
\field
SYMBOL 106 \\f "Symbol" \\s 44
\fldrslt\f4\fs88}}}
(i) for 0 \uc1\u8804\'b2 i \uc1\u8804\'b2 25
Slide 41: The Result