IS2150/TEL2810 Information Security & Privacy
Homework 1
Total Points: 100
Exercise on Propositional/Predicate logic
[25 Points]
(a) Prove that A B (A B) (A B) (use the truth table)
(b) Express the following sentences in propositional/first order logic. B

IS2150/TEL2810 Information Security & Privacy
Solution Homework 1
Total Points: 150
Exercise on Propositional/Predicate logic
[25 Points]
(a) Prove that A B (A B) (A B) (use the truth table)
(b) Express the following sentences in propositional/first order

Graduate Program in Information Science and Telecommunications and Networking
School of Information Sciences
University of Pittsburgh
TEL2821/IS2150: INTRODUCTION TO SECURITY
Lab: Operating Systems and Access Control
Version 3.4, Last Edited 9/10/2011
Stu

IS2150/TEL2810 Information Security and Privacy
Homework 2, Total Points: 100
1) Do exercise 1 from Section 2.6
[25 Points]
2) Do exercise 2c from Section 2.6
[25 Points]
3) Do exercise 1 from section 3.5
[25 Points]
4) Consider a Turing Machine with

IS2510/TEL2810 Information Security & Privacy
Homework 3
Total Points: 100
1. [30 Points]
(a) Given the security levels TOP SECRET, SECRET, CONFIDENTIAL, and
UNCLASSIFIED (ordered from highest to lowest), and the categories A, B, and
C, specify what

IS2150/TEL2810 Information Security & Privacy
Homework 1
Total Points: 60
1) (a) Exercise on Propositional/Predicate logic
(a) Prove that A B (A B) (A B) (you can use the truth table) (5
points)
(b) Express the following sentences in propositional/ first

Scanned by CamScanner
Scanned by CamScanner
Scanned by CamScanner
Scanned by CamScanner
Scanned by CamScanner
Scanned by CamScanner
Scanned by CamScanner

Scanned by CamScanner
Scanned by CamScanner
Scanned by CamScanner
Scanned by CamScanner
Scanned by CamScanner
Scanned by CamScanner
Scanned by CamScanner
Scanned by CamScanner
Scanned by CamScanner

package authentication;
import java.io.*;
import java.net.*;
import java.security.*;
public class ProtectedServer cfw_
public boolean authenticate(InputStream inStream) throws IOException,
NoSuchAlgorithmException
cfw_
DataInputStream in = new DataInputSt

Some useful Information
Mapping of Turing machine to protection system
All Tape Symbols, States rights
Tape cell
subject
Cell si has A
si has A rights on itself
Cell sl
sl has end rights on itself (l represent the rightmost cell visited)
State k,

1.
Quasi- Identifier :
1. Quasi-identifiers are pieces of information that are not of themselves
unique identifiers, but are sufficiently well correlated with an entity that they can be
combined with other quasi-identifiers to create a uniqueidentifier.
2

S2150/TEL2810 Information Security & Privacy
Total Points: 110
Due Date: December 9th, at the beginning of the class
1. Answer the following questions [30 points]
a. Explain in your own words the difference between a quasi-identifier and an identifier

Scanned by CamScanner
Scanned by CamScanner
Scanned by CamScanner
Scanned by CamScanner
Scanned by CamScanner
Scanned by CamScanner
Scanned by CamScanner
Scanned by CamScanner

1.
Windows can implement name-based authorization mechanisms to control access to information
internal to the application. On Windows, if a file or other resource can be shared by two
processes, it is secured against unauthorized access by the operating s

IS2510/TEL2810 Information Security & Privacy
Solution Homework 3
Total Points: 70
1. Do the following from Section 8.7 (Green Book): Exercise 11, 12, 17 (Points
30)
Let m be the message, (e, n) the public key, and d the private key. Recall that ed
mod (n

S2150/TEL2810 Information Security & Privacy
Total Points: 110
Due Date: December 9th, at the beginning of the class
1. Solution: you should check lecture materials.
2. [20 Points]
Suppose the following medical record dataset has been published.

IS2150/TEL2810 Information Security and Privacy
Solution Homework 2
Total Points: 70
1. [20 Points]
(a) Given the security levels TOP SECRET, SECRET, CONFIDENTIAL, and
UNCLASSIFIED (ordered from highest to lowest), and the categories A, B, and

Exercise 9.8 #5
Needham and Schroeder suggest the following variant of their protocol:
1.
Alice Bob : Alice
Bob
Alice : cfw_ Alice, rand3 kBob
2.
3.
Alice
Cathy : cfw_ Alice, Bob, rand1, cfw_ Alice, rand3 kBob
Cathy
Alice : cfw_ Alice, Bob, rand1, kses

IS2510/TEL2810 Information Security & Privacy
Homework 3
Total Points: 100
Due Date: by noon of April 23, 2013 (the solutions will be posted after that)
Q1: Assume that Alice and Bob are friends. Consider two conflict of class sets COI1 = cfw_X, Y and COI

Answers to Selected Chapter 1 Exercises
Note: Student answers, and your answers, to any of these questions may vary from the answers
here. Thats okay, because one looks at these questions with a particular environment in mind (in
other words, we make assu

IS2150/TEL2810 Information Security and Privacy
Solution Homework 2
Total Points: 70
1. [20 Points]
(a) Given the security levels TOP SECRET, SECRET, CONFIDENTIAL, and
UNCLASSIFIED (ordered from highest to lowest), and the categories A, B, and