L7: Password model
Materials
Use the raw slides (pdf) before lecture to take notes, and refer to the annotated slides after lecture.
Manditory Access controls
- What is manditory access control (MAC)?
- The Bell-Lapadula model and how it works
- The AppArmor model, and examples, firefox, etc
- security lattices
- The Biba integrity model, comparison with BPL
- How to circument even these access controls via covert channels