Search for tag: "access"

ECS 235B, Winter 2021; Lecture #19; February 19, 2021

Foundations of Computer and Information Security. This covers more about noninterference. The class starts at 8:09 into the video.

From  Matt Bishop on February 20th, 2021 0 likes 8 plays 0  

ECS 235B, Winter 2021; Lecture #17; February 12, 2021

Foundations of Computer and Information Security. This covers DRM, RBAC, and begins Traducement. The class starts at 3:55 into the video.

From  Matt Bishop on February 13th, 2021 0 likes 17 plays 0  

ECS 235B, Winter 2021; Lecture #16; February 10, 2021

Foundations of Computer and Information Security. This covers DRM, RBAC, and begins Traducement. The class starts at 10:07 into the video.

From  Matt Bishop on February 10th, 2021 0 likes 19 plays 0  

ECS 235B, Winter 2021; Lecture #15; February 8, 2021

Foundations of Computer and Information Security. This finishes discussion of the Chinese Wall model, and covers the CISS and ORCON models. The class starts at 8:55 into the video.

From  Matt Bishop on February 8th, 2021 0 likes 11 plays 0  

ECS 235B, Winter 2021; Lecture #14; February 5, 2021

Foundations of Computer and Information Security. This covers network flooding attacks anf the Chinese Wall model. The class starts at 7:37 into the video.

From  Matt Bishop on February 8th, 2021 0 likes 18 plays 0  

ECS 235B, Winter 2021; Lecture #12; February 1, 2021

Foundations of Computer and Information Security. This covers trust models, introduces availability models, and presents constraint-based availability models. The class starts at 9:46 into the video.

From  Matt Bishop on February 2nd, 2021 0 likes 22 plays 0  

ECS 235B, Winter 2021; Lecture #11; January 29, 2021

Foundations of Computer and Information Security. This covers the Clark-Wilson model and trust models. The class starts at 2:28 into the video. The reference to power comes from parts of Davis…

From  Matt Bishop on January 29th, 2021 0 likes 28 plays 0  

ECS 235B, Winter 2021; Lecture #9; January 25, 2021

Foundations of Computer and Information Security. This covers the second part of the presentation of the formal Bell-LaPadula model and its application to Multics as an example. The class starts at…

From  Matt Bishop on January 25th, 2021 0 likes 33 plays 0  

ECS 235B, Winter 2021; Lecture #8; January 22, 2021

Foundations of Computer and Information Security. This covers the first part of the presentation of the formal Bell-LaPadula model The class starts at 7:43 into the video.

From  Matt Bishop on January 24th, 2021 0 likes 41 plays 0  

ECS 235B, Winter 2021; Lecture #5; January 13, 2021

Foundations of Computer and Information Security. This covers conspiracy in sharing in the Take-Grant Protection Model, security policies, policy models, and mechanisms. The class starts at 10:36…

From  Matt Bishop on January 13th, 2021 0 likes 23 plays 0  

ECS 235B, Winter 2021; Lecture #4; January 11, 2021

Foundations of Computer and Information Security. This covers the Take-Grant Protection Model. The class starts at 10:28 into the video.

From  Matt Bishop on January 11th, 2021 0 likes 36 plays 0  

ECS 235B, Winter 2021; Lecture #3; January 8, 2021

Foundations of Computer and Information Security. This covers attribute-based access control matrices and the HRU result. The class starts at 14:27 into the video.

From  Matt Bishop on January 9th, 2021 0 likes 30 plays 0