Presentation is loading. Please wait.

Presentation is loading. Please wait.

Lecture 2: Security Policy Models Fred Chong CS290N Architectural Support for Secure and Reliable Computing.

Similar presentations


Presentation on theme: "Lecture 2: Security Policy Models Fred Chong CS290N Architectural Support for Secure and Reliable Computing."— Presentation transcript:

1 Lecture 2: Security Policy Models Fred Chong CS290N Architectural Support for Secure and Reliable Computing

2 Multi-Level vs Multi-Lateral Policies

3 Bell-La Padua Policy

4 BLP vs BIBA

5 Biba

6 Example: BLP password file protection Password file is “high” Network reads and writes are “low” Malware from the network is “low,” can’t read password file (read of “high” from “low”) Even if Malware becomes “high” somehow, can’t write password data to the network (write of “high” to “low”)

7 Example: Biba protects system files System files are “high” Malware from the network is “low” Malware can’t write to system files (“low” writes to “high”) Hardware dynamic information flow tracking techniques (taint tracking) implement Biba

8 Chinese Wall

9 BLP vs Chinese Wall

10 Clark-Wilson

11 BLP vs Clark-Wilson

12 BLP with Codewords “Need to know” A Lattice Model

13 BMA medical record policy


Download ppt "Lecture 2: Security Policy Models Fred Chong CS290N Architectural Support for Secure and Reliable Computing."

Similar presentations


Ads by Google