Security Policies
¨ Provide definitions for terms like “authorized”, “prompt”,
“good information” and “disclosure”
¨ Preferably in a way that can be automated
This is a critical failing of most computer security policies
¨ In this course, we will restrict our scope of attention to
computer security policies.
We will assume, for example, that physical access to sensitive
portions of the machine has already been restricted by external
mechanisms.
We will assume that authorized users are ``well behaved.’’ This is
a questionable assumption, and sometimes inappropriate.
600.436 High-
Assurance Systems
Fall 01/Introduction
18