January 19, 2024 Outline
Reading: text, §3.4–3.6, 4.7
Due: Homework #1, due January 19; Project selection, due January 26
Module 10 (Reading: text, §3.4)
- Schematic Protection Model
- Protection type, ticket, function, link predicate, filter function
- Take-Grant as an instance of SPM
- Create rules and attenuation
- Definitions
- path^h predicate
- Capacity flow function
- Maximal state: definition, existence, derivability
- Acyclic attenuating schemes and decidability
Module 11 (Reading: text, §3.5–3.5.3)
- Expressive power
- SPM and HRU
Module 12 (Reading: text, §3.5.4)
- Typed access control model (TAM)
Module 15 (Reading: text, §4.7)
- Secure, precise
- Observability postulate
- Theorem: for any program p and policy c, there is a secure, precise mechanism m* such that, for all security mechanisms m associated with p and c, m* ≈ m
- Theorem: There is no effective procedure that determines a maximally precise, secure mechanism for any policy and program