Outline for May 6, 2004
- CISS
- Intended for medical records; goals are confidentiality,
authentication of annotators and integrity
- Patients, personal health information, clinician
- Assumptions and origin of principles
- Access principles
- Creation principle
- Deletion principle
- Confinement principle
- Aggregation principle
- Enforcement principle
- Comparison to Bell-LaPadula: lattice structure but different focus
- Comparison to Clark-Wilson: specialization
- ORCON
- Originator controls distribution
- DAC, MAC inadequate
- Solution is combination
- Role-based Access Control (RBAC)
- Definition of role
- Partitioning as job function
- Containment
- What is a cryptosystem?
- (M, C, K, D, E)
- Attacks: known ciphertext, known plaintext, chosen plaintext
- Transposition ciphers
- Show rail-fence cipher as example
- Show anagramming
- Simple substitution ciphers
- Do Cæsar cipher
- Present Vigenère tableau
- Discuss breaking it (Kasiski method).
Here is a PDF version of this document.