|
EPS 131 Lecture 20 (Second Part)
|
|
Foundations of Computer and Information Security. This covers generalized noninterference, nondeducibility, and restrictiveness. The class starts at 8:24 into the video.
|
|
|
|
Foundations of Computer and Information Security. This covers the beginnings of noninterference. The class starts at 6:41 into the video.
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Foundations of Computer and Information Security. This covers trust models, introduces availability models, and presents constraint-based availability models. The class starts at 9:46 into the video.
|
|
|
|
|
|
|
|
Foundations of Computer and Information Security. This covers tranquility, System Z, the basics of integrity, and the Biba model. The class starts at 2:27 into the video.
|
|
Foundations of Computer and Information Security. This covers the second part of the presentation of the formal Bell-LaPadula model and its application to Multics as an example. The class starts at…
|