March 30, 2026 Outline
Reading: text, §1, 2.1–2.2, 20.1.2.2
Assignments: Homework #1, due April 10; Project selection, due April 17
- Introduction to class
- General information
- Homework
- Handouts
- The basic components of security
- Reference monitors and security policy
- Access control matrix and entities
- Subject, objects (includes subjects)
- State is (S, O, A) where A is access control matrix
- Rights (represent abstract notions)
- Instantiating access control matrices
- Example: UNIX file system
- read, write, execute on files
- read, write, execute on directories
- Access control matrix and entities
- Example: Boolean expressions
- Example: History and limiting rights
- Primitive operations
- enter r into A[s, o]
- delete r from A[s, o]
- create subject s
(note that ∀ x [ A[s′, x] = A[x, s′] = ∅ ])
- create object o (note that ∀ x [ A[x, o′] = ∅ ])
- destroy subject s
- destroy object o
- Commands and examples
- Regular command: create•file
- Mono-operational command: make•owner
- Conditional command: grant•rights
- Biconditional command: grant•read•if•r•and•c
- Doing “or” of 2 conditions: grant•read•if•r•or•c
- General form
- Miscellaneous points
- Copy flag and right
- Own as a distinguished right
- Principle of attenuation of privilege