Note-9

Note-9 - CSE 467/598 Data and Information Security Prof....

Info iconThis preview shows pages 1–5. Sign up to view the full content.

View Full Document Right Arrow Icon
CSE 467/598 Data and Information Security Prof. Gail-Joon Ahn IMPORTANT DATES ! Project: ! Phase I: 11:59PM, February 22, 2011 ! Exam #1 (Midterm): Mar 8, 2011 ! Spring Break: Mar 15 & 17, 2011 (no class) ! Class Presentation : April19, 21, 26, and 28, 2011 (paper report due) ! Exam #2 (Final): May 10, 2011 (12:00PM – 2:00 PM) 2
Background image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Cyber Gazette ! Google with dual-factor authentication Google users can choose to turn on a so-called “two-factor authentication” feature, which will require them to type in a special, short-lived second password in addition to their normal password to get into their account. Users will be able to get the codes by text or a phone call, or use smart phone apps for Android, iPhone and Blackberry to generate the codes. The security feature does introduce some complexity . For instance, those who are traveling to another country may not be able to get text messages while traveling. The smart phone apps for Android and the iPhone, however, will generate usable codes even without a net connection. Google is also offering the option of preprinted special codes that a user can choose to use while traveling. 3 Based on the slides for "Computer Security: Art and Science" 4 Take-Grant Protection Model ! A specific (not generic) system ! Set of rules for state transitions ! Safety decidable, and in time linear with the size of the system ! Goal: find conditions under which rights can be transferred from one entity to another in the system
Background image of page 2
Based on the slides for "Computer Security: Art and Science" 5 Example ! p ! u # v ! w # x ! y ! s' # s # q g t g t t g g ! islands { p, u } { w } { y, s' } ! bridges u, v, w w, x, y ! initial span p (associated word ! ) ! terminal span s's (associated word t ) r r? Based on the slides for "Computer Security: Art and Science" 6 Key Question ! Existence: Take-Grant Protection Model is decidable ! Universality: In general, question undecidable, so for some models it is not decidable ! What is the dividing line? -> what characteristics distinguish a model in which the safety question is decidable from a model in which the safety question is not decidable?
Background image of page 3

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Based on the slides for "Computer Security: Art and Science" 7 Schematic Protection Model !
Background image of page 4
Image of page 5
This is the end of the preview. Sign up to access the rest of the document.

Page1 / 15

Note-9 - CSE 467/598 Data and Information Security Prof....

This preview shows document pages 1 - 5. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online