CS5430 Homework 5: Mandatory Access Control

General Instructions. You are expected to work alone on this assignment.

Due Monday April 16, 10am. No late assignments will be accepted.

Submit your solution using CMS. Prepare your solution as .doc, .docx, or .pdf, as follows:


Problem 1:

You are consulting to a new Internet start-up company, AppropriateTube, whose value proposition is facilitating the creation and dissemination of age- and belief-appropriate videos for impressionable children. Age is measured in terms of integers (representing years since birth) and defines the minimum age of an appropriate viewer; beliefs are characterized by a set of the following terms, called content-descriptors:

The system envisaged by AppropriateTube would work as follows.

Give rules for how the meta-data for each video should be used by the video-viewer program and the rules for how it should be produced by the mash-up creation program.


Problem 2:

The Bell-LaPadula rules for MLS concern reads and writes to files. Each file F has a classification, which is a label L(F); each subject S has a classification, which is a label L(S); and there is an ordering "<=" on labels. This ordering is the basis for the "no read up" and "no write down" rules that define read and write operations authorized for a subject.

The usual accounts of Bell-LaPadula are silent about the response generated when a read or write operation would violate the BLP access rules. For this assignment, assume that such an access attempt returns an error message "Access Denied: File unavailable". And assume that an attempt to access a file that does not exist returns the same message.

  1. Suppose we wish to support an additional operation
       createFile( FName , Lbl )
    
    whose execution creates a new empty file that is named FName and has label Lbl. What, if any, rules about labels should be imposed on execution of createFile if we want to ensure that classified information doesn't leak.
  2. Suggest error messages to be returned from invoking the createFile for the following two cases:
    1. the rule you suggest in (a) is not satisfied.
    2. the rule you suggest in (a) is satisfied but a file with name FName already exists.
    Give a rationale for the wordings you propose.

Problem 3:

Describe the users, roles, permissions, restrictions and authorizations for an RBAC scheme to control access to files on a course web site for a class like CS5430. Assume the web site has postings of lecture notes, hw problem sets, and hw solution sets, and grades.