1 / 13

Lecture 2: Security Policy Models

Lecture 2: Security Policy Models. Fred Chong CS290N Architectural Support for Secure and Reliable Computing. Multi-Level vs Multi-Lateral Policies. Bell-La Padua Policy. BLP vs BIBA. Biba. Example: BLP password file protection. Password file is “high”

howard
Télécharger la présentation

Lecture 2: Security Policy Models

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Lecture 2: Security Policy Models Fred Chong CS290N Architectural Support for Secure and Reliable Computing

  2. Multi-Level vs Multi-Lateral Policies

  3. Bell-La Padua Policy

  4. BLP vs BIBA

  5. Biba

  6. Example: BLP password file protection • Password file is “high” • Network reads and writes are “low” • Malware from the network is “low,” can’t read password file (read of “high” from “low”) • Even if Malware becomes “high” somehow, can’t write password data to the network (write of “high” to “low”)

  7. Example: Biba protects system files • System files are “high” • Malware from the network is “low” • Malware can’t write to system files (“low” writes to “high”) • Hardware dynamic information flow tracking techniques (taint tracking) implement Biba

  8. Chinese Wall

  9. BLP vs Chinese Wall

  10. Clark-Wilson

  11. BLP vs Clark-Wilson

  12. BLP with Codewords • “Need to know” • A Lattice Model

  13. BMA medical record policy

More Related