Outline for February 26, 2007

  1. Greetings and Felicitations!
  2. Access Control Matrix interpretation
    1. Model
    2. ACM conditions
    3. Policy conditions
    4. Result
  3. Policies that change over time
    1. Generalization of noninterference
    2. Example
  4. Composing deterministic, noninterference-secure systems


Here is a PDF version of this document.