Outline for October 2, 2023

Reading: text, §4.3, 2.1–2.2, 5.1
Due: Homework 1, due October 9; Project teams, question, due Oct 11


  1. Policy
    1. Example

  2. Types of Policies
    1. Military/government vs. confidentiality
    2. Commercial vs. integrity

  3. Access Control Matrix
    1. Commands, nesting, and conditions
      1. create subject
      2. create object
      3. destroy subject
      4. destroy object
      5. enter r into A[s, o]
      6. delete r from A[s, o],
    2. Copy flag, own rights
    3. Principle of attenuation of privilege

  4. Undecidability result

  5. Goals of confidentiality policies

  6. Bell-LaPadula Model with levels only
    1. Security levels

UC Davis sigil
Matt Bishop
Office: 2209 Watershed Sciences
Phone: +1 (530) 752-8060
Email: [email protected]
ECS 235A, Computer and Information Security
Version of October 2, 2023 at 2:49PM

You can also obtain a PDF version of this.

Valid HTML 4.01 Transitional Built with BBEdit Built on a Macintosh