feb14 - CS 426 class Feb 14, 2012 Happy Valentine's Day

Info iconThis preview shows pages 1–2. Sign up to view the full content.

View Full Document Right Arrow Icon
CS 426 class Feb 14, 2012 Happy Valentine's Day www.cs.purdue.edu/homes/ssw/cs426/{index.html,syll.pdf,outline} Trusted Operating System security - Read Chapter 5 2. Model of the environment to be secured and a way to do it. The model represents the policy. A lattice is used to represent a dominance property (s >= o). A lattice is a set with a partial order <= which is transitive and anti-symmetric. Not every pair a,b need be comparable in a lattice. However, for all a,b in a lattice there is an upper bound u The <= of military security is modeled as a lattice. The Bell-La Padula Confidentiality Model describes allowed info flow in a secure system with more than one class of data and/or user. Let c(s) = class (clearance) of subject s Let c(o) = class of object o Two properties: 1. Simple security (read down) s may read o iff c(o) <= c(s). 2. *-property (write up) If s may read o, then s may write p
Background image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Image of page 2
This is the end of the preview. Sign up to access the rest of the document.

Page1 / 2

feb14 - CS 426 class Feb 14, 2012 Happy Valentine's Day

This preview shows document pages 1 - 2. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online