Welcome to Scribd, the world's digital library. Read, publish, and share books and documents. See more ➡
Download
Standard view
Full view
of .
Add note
Save to My Library
Sync to mobile
Look up keyword or section
Like this
1Activity
×

Table Of Contents

1.2 Threats
1.3 Policy and Mechanism
1.4 Assumptions and Trust
1.5.1 Specification
1.5.2 Design
1.5.3 Implementation
1.6.1 Cost-Benefit Analysis
1.6.2 Risk Analysis
1.6.3 Laws and Customs
1.7.1 Organizational Problems
1.7.2 People Problems
1.8 Tying It All Together
1.9 Summary
2.1 Protection State
2.2.1 Access Control by Boolean Expression Evaluation
2.2.2 Access Controlled by History
2.3 Protection State Transitions
2.4.1 Copy Right
4.1 Security Policies
4.2 Types of Security Policies
4.3 The Role of Trust
4.4 Types of Access Control
4.5.1 High-Level Policy Languages
4.5.2 Low-Level Policy Languages
4.6.1 General University Policy
4.6.2.1 The Electronic Mail Policy Summary
4.6.2.2 The Full Policy
4.6.2.3 Implementation at UC Davis
4.7 Security and Precision
4.8 Summary
5.1 Goals of Confidentiality Policies
5.2.1 Informal Description
5.2.2.1 Assigning MAC Labels
5.2.2.2 Using MAC Labels
5.2.3 Formal Model
5.2.4.1 The get-read Rule
5.2.4.2 The give-read Rule
5.4.1 McLean's -Property and the Basic Security Theorem
5.4.2 McLean's System Z and More Questions
5.4.3 Summary
5.5 Summary
6.1 Goals
6.2.1 Low-Water-Mark Policy
6.2.2 Ring Policy
6.2.3 Biba's Model (Strict Integrity Policy)
6.3.1 Lipner's Use of the Bell-LaPadula Model
6.3.2 Lipner's Full Model
6.3.3 Comparison with Biba
6.4.1 The Model
6.4.2 Comparison with the Requirements
6.4.3 Comparison with Other Models
6.5 Summary
6.6 Research Issues
7.1.1 Informal Description
7.1.2 Formal Model
7.1.3 Bell-LaPadula and Chinese Wall Models
7.1.4 Clark-Wilson and Chinese Wall Models
7.2 Clinical Information Systems Security Policy
7.3 Originator Controlled Access Control
7.4 Role-Based Access Control
7.5 Summary
0 of .
Results for:
No results containing your search query
P. 1
27203102 Information Security

27203102 Information Security

Ratings: (0)|Views: 896|Likes:
Published by anujkumar7

More info:

Published by: anujkumar7 on Dec 05, 2010
Copyright:Attribution Non-commercial

Availability:

Read on Scribd mobile: iPhone, iPad and Android.
download as PDF, TXT or read online from Scribd
See More
See less

11/08/2011

pdf

text

original

You're Reading a Free Preview
Pages 5 to 24 are not shown in this preview.
You're Reading a Free Preview
Pages 29 to 86 are not shown in this preview.

You're Reading a Free Preview

Download
/*********** DO NOT ALTER ANYTHING BELOW THIS LINE ! ************/ var s_code=s.t();if(s_code)document.write(s_code)//-->