April 3, 2026 Outline

Reading: text, §3.3–3.4
Assignments: Homework #1, due April 10; Project selection, due April 17

  1. Conspiracy
    1. What is of interest?
    2. Access, deletion sets
    3. Conspiracy graph
    4. Number of conspirators

  2. Schematic Protection Model
    1. Protection type, ticket, function, link predicate, filter function

  3. Schematic Protection Model
    1. Protection type, ticket, function, link predicate, filter function
    2. Take-Grant as an instance of SPM
    3. Create rules and attenuation
    4. Definitions
    5. pathh predicate
    6. Capacity flow function
    7. Maximal state: definition, existence, derivability

  4. Acyclic attenuating schemes and decidability

UC Davis sigil
Matt Bishop
Office: 2209 Watershed Sciences
Phone: +1 (530) 752-8060
Email: mabishop@ucdavis.edu
ECS 235B, Foundations of Computer and Information Security
Version of April 2, 2026 at 3:31PM

You can also obtain a PDF version of this.

Valid HTML 4.01 Transitional Built with BBEdit Built on a Macintosh