-
CSE543 - Introduction to Computer and Network Security Page
CSE543 - Introduction to Computer and Network Security Module: Access Control
Professor Trent Jaeger Fall 2010
1
CSE543 - Introduction to Computer and Network Security Module: - - PowerPoint PPT Presentation
CSE543 - Introduction to Computer and Network Security Page
1
CSE543 - Introduction to Computer and Network Security Page
2
CSE543 - Introduction to Computer and Network Security Page
3
CSE543 - Introduction to Computer and Network Security Page
4
CSE543 - Introduction to Computer and Network Security Page
5
CSE543 - Introduction to Computer and Network Security Page
6
Memory
CSE543 - Introduction to Computer and Network Security Page
7
CSE543 - Introduction to Computer and Network Security Page
8
CSE543 - Introduction to Computer and Network Security Page
9
CSE543 - Introduction to Computer and Network Security Page
describing policy
10
CSE543 - Introduction to Computer and Network Security Page
11
CSE543 - Introduction to Computer and Network Security Page
12
CSE543 - Introduction to Computer and Network Security Page
13
CSE543 - Introduction to Computer and Network Security Page
O1 O2 O3 J ? ? ? S2 ? ? ? S3 ? ? ?
14
CSE543 - Introduction to Computer and Network Security Page
O2 O3 J R RW RW S2
RW S3
RW
15
CSE543 - Introduction to Computer and Network Security Page
O1 O2 O3 J R RW RW S2
RW S3
RW
16
CSE543 - Introduction to Computer and Network Security Page
O1 O2 O3 J R RW RW S2
RW S3
RW
17
CSE543 - Introduction to Computer and Network Security Page
18
CSE543 - Introduction to Computer and Network Security Page
O1 O2 O3 J1 R R
RW
19
CSE543 - Introduction to Computer and Network Security Page
– RWX assigned by file owners
calculus is used to evaluate rights
20
CSE543 - Introduction to Computer and Network Security Page
21
CSE543 - Introduction to Computer and Network Security Page
22
CSE543 - Introduction to Computer and Network Security Page
23
CSE543 - Introduction to Computer and Network Security Page
24
CSE543 - Introduction to Computer and Network Security Page
25
CMPSC443 - Introduction to Computer and Network Security Page
26
CMPSC443 - Introduction to Computer and Network Security Page
27
CMPSC443 - Introduction to Computer and Network Security Page
28
CMPSC443 - Introduction to Computer and Network Security Page
29
CMPSC443 - Introduction to Computer and Network Security Page
30
CMPSC443 - Introduction to Computer and Network Security Page
31
CMPSC443 - Introduction to Computer and Network Security Page
32
CMPSC443 - Introduction to Computer and Network Security Page
33
CMPSC443 - Introduction to Computer and Network Security Page
34
CMPSC443 - Introduction to Computer and Network Security Page
35
Bob: CONF., {INTEL}) Charlie: TS, {CRYPTO, NUC, INTEL}) Alice: (SEC., {CRYTPO, NUC}) DocA: (CONFIDENTIAL, {INTEL}) DocB: (SECRET, {CRYPTO}) DocC: (UNCLASSIFIED, {NUC})
CMPSC443 - Introduction to Computer and Network Security Page
36
CMPSC443 - Introduction to Computer and Network Security Page
monk may write a prayer book that can be read by commoners, but not
may read a book written by the high priest, but may not read a pamphlet written by a lowly commoner).
37
CMPSC443 - Introduction to Computer and Network Security Page
38
CMPSC443 - Introduction to Computer and Network Security Page
39
Bob: (CONF., {INTEL}) Charlie: (TS, {CRYPTO, NUC, INTEL}) Alice: (SEC., {CRYTPO, NUC}) DocA: (CONFIDENTIAL, {INTEL}) DocB: (SECRET, {CRYPTO}) DocC: (UNCLASSIFIED, {NUC})
CMPSC443 - Introduction to Computer and Network Security Page
40
CMPSC443 - Introduction to Computer and Network Security Page
41
CMPSC443 - Introduction to Computer and Network Security Page
42
CMPSC443 - Introduction to Computer and Network Security Page
43
CMPSC443 - Introduction to Computer and Network Security Page
44
CDI CDI CDI CDI User User User User TP TP TP CDI CDI CDI CDI User User User User
CMPSC443 - Introduction to Computer and Network Security Page
45
CMPSC443 - Introduction to Computer and Network Security Page
46
CMPSC443 - Introduction to Computer and Network Security Page
47
CMPSC443 - Introduction to Computer and Network Security Page
faculty tickets at student prices?
48
this role hierachy enforces the requirement that as a ticket buyer you commit to being a faculty member or staff/admin, etc. Students may get the right to buy cheap seats, but not to buy good locations, and vice versa