# HG changeset patch # User Christian Urban # Date 1349811292 -3600 # Node ID 7dd3410376694033427415ae3924e6319400d120 # Parent 24116ce8c294180e40f280800ab7bb62f87bed03 tuned diff -r 24116ce8c294 -r 7dd341037669 hw03.tex --- a/hw03.tex Tue Oct 09 20:30:06 2012 +0100 +++ b/hw03.tex Tue Oct 09 20:34:52 2012 +0100 @@ -27,7 +27,7 @@ \item What does it mean that the program \texttt{passwd} has the \texttt{setuid} bit be set? Why is this necessary? -\item What does the Bell --- La Pudela model ensure? Similarly, what does the Biba model ensure? +\item What does the Bell --- La Padula model ensure? Similarly, what does the Biba model ensure? \end{enumerate} \end{document} diff -r 24116ce8c294 -r 7dd341037669 slides03.tex --- a/slides03.tex Tue Oct 09 20:30:06 2012 +0100 +++ b/slides03.tex Tue Oct 09 20:34:52 2012 +0100 @@ -495,7 +495,7 @@ \frametitle{\begin{tabular}{@ {}c@ {}}Security Levels (2)\end{tabular}} \begin{itemize} -\item Bell --- La Pudela preserves data secrecy, but not data integrity\bigskip\pause +\item Bell --- La Padula preserves data secrecy, but not data integrity\bigskip\pause \item Biba model is for data integrity @@ -688,7 +688,7 @@ {\bf How well does the security solution mitigate those risks?}\bigskip -Another seemingly obvious question, but one that is frequently ignored. If the security solution doesnŐt solve the problem, itŐs no good. This is not as simple as looking at the security solution and seeing how well it works. It involves looking at how the security solution interacts with everything around it, evaluating both its operation and its failures. +Another seemingly obvious question, but one that is frequently ignored. If the security solution doesnŐt solve the problem, it's no good. This is not as simple as looking at the security solution and seeing how well it works. It involves looking at how the security solution interacts with everything around it, evaluating both its operation and its failures. \end{frame}} %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%