Positive vs. Negative Policies:
¨Compare:
–Prevent disclosure to unauthorized users
–Ensure that disclosure occurs only to authorized users,
and only in a fashion consistent with the
security policy.
¨The second can be tested:
1.Show that there exists no communication path to any unauthorized user agent.
2.Show that the last link in each remaining path is
trusted software.
3.Verify that each piece of trusted software enforces the appropriate security policy.
–The first cannot!