Outline for February 29, 2012
Reading:
§14.6, 16.1–16.2
Identity
State and cookies
Anonymity (remailers, onion routing)
Information flow
Entropy
Random variables
Joint probability
Conditional probability
Entropy (or uncertainty in bits)
Joint entropy
Conditional entropy
Entropy-based analysis
Flow of information from
x
to
y
Implicit flow of information
Non-lattice policies
Transitivity
Information flow policy
Confinement flow model
Transitive non-lattice policies
Quasi-ordered sets
Non-transitive policies
Dual mappings
Theorem: a dual mapping from a reflexive information flow policy into an ordered set is order-preserving
A PDF version is available here.
ECS 235B, Foundations of Computer and Information Security
Winter Quarter 2012