Lecture 28: Authorization
These topics are well covered by the 2014fa lecture slides.
- key terms: access control matrix, capabilities, access control lists, mandatory vs. discretionary access control
- "secure" is another word for "correct"
- trust is an assumption made when reasining about security
- trusted computing base is the set of components that are trusted in any argument of correctness