Note-5

Note-5 - CSE 467/598 Data and Information Security Prof....

Info iconThis preview shows pages 1–5. Sign up to view the full content.

View Full Document Right Arrow Icon
CSE 467/598 Data and Information Security Prof. Gail-Joon Ahn 2 Reading: Chapter 2
Background image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
based on the slides for "Computer Security: Art and Science" 3 Access Control Matrix ! Overview ! Access Control Matrix Model ! Boolean Expression Evaluation ! History ! Protection State Transitions ! Commands ! Conditional Commands ! Special Rights ! Principle of Attenuation of Privilege based on the slides for "Computer Security: Art and Science" 4 Reminder: Types of Mechanisms secure precise broad set of reachable states set of secure states
Background image of page 2
based on the slides for "Computer Security: Art and Science" 5 States Data States data values Data Privilege States Authorization Privilege States Values of the system directly relevant to data protection Values of the system relevant to authorization management Protection States Protection States based on the slides for "Computer Security: Art and Science" 6 State of an Information System Data Tables Files Excel Sheets Data Access Control Authorization Control Data State Data Privilege State Authorization Privilege State Protection State Employee Records Database
Background image of page 3

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
based on the slides for "Computer Security: Art and Science" 7 Overview ! Protection state of system ! Describes current settings, values of the system relevant to protection ! Access control matrix ! Describes protection state precisely ! In particular, it describes the rights of subjects based on the slides for "Computer Security: Art and Science" 8 Access control matrix !"#$%&’ )$*&+&+$’, ’-"#$%&’ !
Background image of page 4
Image of page 5
This is the end of the preview. Sign up to access the rest of the document.

This note was uploaded on 03/09/2011 for the course CSE 497 taught by Professor Ahn during the Spring '11 term at ASU.

Page1 / 15

Note-5 - CSE 467/598 Data and Information Security Prof....

This preview shows document pages 1 - 5. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online