Outline for January 30, 2002

Reading: §4.1-4.5, §5.1-5.3 (not including §5.2.3, 5.3.1)

  1. Greetings and Felicitations!
  2. Puzzle of the day
  3. Policy
    1. Sets of authorized, unauthorized states
    2. Secure systems in terms of states
    3. Mechanism vs. policy
  4. Types of Policies
    1. Military/government vs. confidentiality
    2. Commercial vs. integrity
  5. Types of Access Control
    1. Mandatory access control
    2. Discretionary access control
    3. Originator-controlled access control
  6. High-Level Policy Languages
    1. Characterization
    2. Example: DTEL
  7. Low-Level Policy Languages
    1. Characterization
    2. Example: Tripwire configuration file
  8. Goals of Confidentiality Policies
  9. Bell-LaPadula Model with Levels Only
    1. Security Levels
    2. Simple Security Property
    3. *-Property
    4. Basic Security Theorem
  10. Bell-LaPadula Model
    1. Compartments
    2. BLP as lattice structure
    3. Simple Security Property
    4. *-Property
    5. Basic Security Theorem
  11. DG/UX B2 UNIX System
    1. Hierarchy of levels
    2. Labels, explicit and implicit
    3. MAC tuples

ECS 153, Introduction to Computer Security
Winter Quarter 2002
Email: [email protected]