Lecture 17 - Class Notes November 13, 2008 Trusted...

Info iconThis preview shows pages 1–2. Sign up to view the full content.

View Full Document Right Arrow Icon
Class Notes November 13, 2008 Trusted Operating System Sound Security Policy Military Security Policy 5 Classification Levels (hierarchal sensitivity requirements) Top Secret Secret Confidential Restricted Unclassified Sensitivity of an object O is denoted by rank o. Information is limited by a need to know rule. Taking each piece of classified information is associated with a project called a compartment . Now access can be restricted to simply one compartment. A compartment may also overlap a security level. The classification of an object is denoted by the rank o followed by the compartment(s) o . This allows enforcement of the need to know rule by looking at the security level + topic. To get access, a person must be cleared. Clearance is an indication that a person is trusted for that compartment and that level. It can be expressed the same way (rank, compartments). Can define a dominance relation <= o object, s subject S <= O if and only if rank s <= rank o components s <= components
Background image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Image of page 2
This is the end of the preview. Sign up to access the rest of the document.

This note was uploaded on 04/20/2010 for the course CECS 478 taught by Professor Englert during the Spring '10 term at CSU Long Beach.

Page1 / 2

Lecture 17 - Class Notes November 13, 2008 Trusted...

This preview shows document pages 1 - 2. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online