Design of protection mechanisms Flashcards
Access
The ability to make use of information stored in a computer system. Used frequently as a verb, to the horror of grammarians.
authenticate
To verify the identity of a person (or other entities external to the protection system) making a request.
authorize
To grant a principle access to certain information.
capability
In a computer system, an unforgeable ticket, which when presented can be taken as incontestable proof that the presenter is authorized to have access to the object named in the ticket.
certify
To check the accuracy, correctness, and completeness of a security or protection mechanism.
What is Complete Isolation?
A protection system that seperates principles into compartments between which no flow of information or control is possible.
What is Confinement?
Allowing a borrowed program to have access to data, while ensuring the program cannot release information.
descriptor
a protected value which is (or leads to) the physical address of some prtotected object.
Discretionary
In contrast with non discrestionary, controls on access to an object that may be changed by the creator of the object.
Domain
The set of objects that may be directly accessed by a principle.
Encipherment
the usually reversible scaling of data according to a secret transformation key, so as to make it safe for transmission or storage in a physically unprotected environment.
What does it mean to Grant?
to grant is to authorize.
Hierarchical Control
Referring to ability to change authorization, a scheme in which the record of each authorization is controlled by another authorization, resulting in a hierarchicical tree of authorizations.
List Oriented
Used to describe a protection system in which each protected object has a list of authorized principals.
Password
A Secret character string used to authenticate the claimed identity of an individual.