Note-4

Note-4 - CSE 467/598 Data and Information Security Prof....

Info iconThis preview shows pages 1–6. Sign up to view the full content.

View Full Document Right Arrow Icon
CSE 467/598 Data and Information Security Prof. Gail-Joon Ahn 2
Background image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
INTEGRITY AVAILABILITY CONFIDENTIALITY (secrecy) USAGE 3 based on the slides for "Computer Security: Art and Science" 4 Policy Languages ! Express security policies in a precise way ! Two possible approaches: ! Low-level languages ! Policy constraints expressed in terms of program options, input, or specific characteristics of entities on system ! xhost +cse467server –art101server
Background image of page 2
based on the slides for "Computer Security: Art and Science" 5 Monolithic Software Design Applications Handles application semantics using a PL Also handles security using a PL Problems: portability? modifiability? bugs?. .. based on the slides for "Computer Security: Art and Science" 6 Policy Languages ! Express security policies in a precise way ! Two possible approaches: ! Low-level languages ! Policy constraints expressed in terms of program options, input, or specific characteristics of entities on system ! High-level languages ! Policy constraints expressed abstractly ! deny ( alice op print ) when condition 1 v condition 2
Background image of page 3

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
based on the slides for "Computer Security: Art and Science" 7 High-Level Policy Languages ! Constraints expressed independent of enforcement mechanism ! Constraints expressed unambiguously ! Requires a precise language, usually a mathematical, logical, or programming-like language based on the slides for "Computer Security: Art and Science" 8 DBMS DBMSs enable abstraction Applications Handles application semantics using a PL Handles data management using a high- level language
Background image of page 4
and Science" 9 DBMSs provide high-level of abstraction for queries ! Logical schema defines (logical) structure ! Physical schema describes the files and the indexes used. Logical Schema (e.g. Relational) Physical Schema Application based on the slides for "Computer Security: Art and Science" 10 Relational databases ! Data is in a tabular form ! Schema describes the content ! A key uniquely identifies a given tuple (i.e., row in the table) ! Each attribute has a domain ! Additional integrity constraints describe the properties of data NAME SSN OFFICE TITLE .. .. .. .. .. .. .. J. Doe 555-5555 GWC 999 Asst. Prof
Background image of page 5

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Image of page 6
This is the end of the preview. Sign up to access the rest of the document.

Page1 / 17

Note-4 - CSE 467/598 Data and Information Security Prof....

This preview shows document pages 1 - 6. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online