# HG changeset patch # User Christian Urban # Date 1349810814 -3600 # Node ID e9288308dbcfe18b6b610873f0b0cf0d0f517152 # Parent f91255f9920533b27e7723fc9c68c2834c86a496 tuned diff -r f91255f99205 -r e9288308dbcf hw03.pdf Binary file hw03.pdf has changed diff -r f91255f99205 -r e9288308dbcf hw03.tex --- /dev/null Thu Jan 01 00:00:00 1970 +0000 +++ b/hw03.tex Tue Oct 09 20:26:54 2012 +0100 @@ -0,0 +1,32 @@ +\documentclass{article} +\usepackage{charter} +\usepackage{hyperref} + +\begin{document} + +\section*{Homework 2} + +\begin{enumerate} +\item What does the principle of least privilege say? + +\item In which situations can the access control mechanism of Unix +file permissions be used? + +\begin{itemize} +\item[(a)] Alice wants to have her files readable, except for her office mates. +\item[(b)] Bob and Sam want to share some secret files. +\item[(c)] Root wants some of her files to be public. +\end{itemize} + +\item What should be the architecture of a network application under Unix +be that processes potentially hostile data? + +\item What does the Bell --- La Pudela model ensure? Similarly, what does the Biba model ensure? +\end{enumerate} + +\end{document} + +%%% Local Variables: +%%% mode: latex +%%% TeX-master: t +%%% End: diff -r f91255f99205 -r e9288308dbcf slides03.pdf Binary file slides03.pdf has changed diff -r f91255f99205 -r e9288308dbcf slides03.tex --- a/slides03.tex Tue Oct 09 14:42:37 2012 +0100 +++ b/slides03.tex Tue Oct 09 20:26:54 2012 +0100 @@ -477,7 +477,7 @@ \begin{itemize} \item In military applications you often have many security levels (top-secret, secret, confidential, unclassified)\bigskip\pause -\item Information flow: Bell --- La Pudela model +\item Information flow: Bell --- La Padula model \begin{itemize} \item read: your own level and below