Lectures 13-14

The past two lectures have focused primarily on access control. We reviewed different mechanisms for ensuring access control (e.g., access control matrices, access control lists, and capablities), following by different policies for access control (discretionary AC, several varieties of mandatory AC, and role-based AC).

We wrapped up the module on system security with a brief discussion of code-based access control and trusted computing.

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s

%d bloggers like this: