tuned
authorChristian Urban <urbanc@in.tum.de>
Tue, 09 Oct 2012 20:26:54 +0100
changeset 33 e9288308dbcf
parent 32 f91255f99205
child 34 24116ce8c294
tuned
hw03.pdf
hw03.tex
slides03.pdf
slides03.tex
Binary file hw03.pdf has changed
--- /dev/null	Thu Jan 01 00:00:00 1970 +0000
+++ b/hw03.tex	Tue Oct 09 20:26:54 2012 +0100
@@ -0,0 +1,32 @@
+\documentclass{article}
+\usepackage{charter}
+\usepackage{hyperref}
+
+\begin{document}
+
+\section*{Homework 2}
+
+\begin{enumerate}
+\item What does the principle of least privilege say?
+
+\item In which situations can the access control mechanism of Unix
+file permissions be used?
+
+\begin{itemize}
+\item[(a)] Alice wants to have her files readable, except for her office mates.
+\item[(b)] Bob and Sam want to share some secret files.
+\item[(c)] Root wants some of her files to be public.
+\end{itemize}
+
+\item What should be the architecture of a network application under Unix 
+be that processes potentially hostile data?
+
+\item What does the Bell --- La Pudela model ensure? Similarly, what does the Biba model ensure?
+\end{enumerate}
+
+\end{document}
+
+%%% Local Variables: 
+%%% mode: latex
+%%% TeX-master: t
+%%% End: 
Binary file slides03.pdf has changed
--- a/slides03.tex	Tue Oct 09 14:42:37 2012 +0100
+++ b/slides03.tex	Tue Oct 09 20:26:54 2012 +0100
@@ -477,7 +477,7 @@
 \begin{itemize}
 \item In military applications you often have many security levels (top-secret, secret, confidential, unclassified)\bigskip\pause 
 
-\item Information flow: Bell --- La Pudela model
+\item Information flow: Bell --- La Padula model
 
 \begin{itemize}
 \item read: your own level and below