Foundations and Overview

Jan 31 (Marks/Marceau) scribe notes:

B. W. Lampson
Protection
Proc. of the 5th Princeton Symposium on Information Sciences and Systems, pp. 437-443, March 1971
http://www.research.microsoft.com/lampson/09-Protection/Acrobat.pdf

Feb 2 (Leo Meyerovich/Cooper) scribe notes:

J. H. Saltzer and M. D. Schroeder
The protection of information in computer systems
Proceedings of the IEEE, 63(9):1278-1308, September 1975
http://www.cs.virginia.edu/~evans/cs551/saltzer/  (Section 1A)

Feb 7 (Tschantz/Hopkins) scribe notes:

D. Elliott Bell and Len LaPadula
Secure Computer Systems: Mathematical Foundations (vol. 1)
1973
http://www.albany.edu/acc/courses/ia/classics/belllapadula1.pdf

Feb 9 (Yao/Mira Meyerovich) scribe notes:

John McLean
The Specification and Modeling of Computer Security
Computer, 1990
http://chacs.nrl.navy.mil/publications/CHACS/1990/1990mclean-computer.pdf

Feb 14 (Leen/Arnaudov):

Santosh Chokhani
Trusted products evaluation

Communications of the ACM, Volume 35, Issue 7 (July 1992)

http://doi.acm.org/10.1145/129902.129907

Feb 16 (Berg/Marks) scribe notes:

Clark and Wilson
A Comparison of Commercial and Military Computer Security Policies
1987
http://www.cs.rice.edu/~dwallach/courses/comp527_f2004/ClarkWilson87.pdf

Richard E. Smith
Cost profile of a highly assured, secure operating system
ACM Transactions on Information and System Security 2001
http://portal.acm.org/citation.cfm?id=383778

Feb 21: Long Weekend marches on

Feb 23 (Eddon/Leo Meyerovich) scribe notes:

J. A. Goguen and J. Meseguer
Security Policies and Security Models
1982 IEEE Symposium on Security and Privacy
http://www.cs.ucsb.edu/~kemm/courses/cs177/noninter.pdf

Feb 28 (Mira Meyerovich/Leen) scribe notes:

Martin Abadi, Michael Burrows, Butler Lampson, and Gordon Plotkin
Calculus for access control in distributed systems
Transactions on Programming Languages and Systems (TOPLAS), Volume 15, Issue 4 (September 1993)
http://doi.acm.org/10.1145/155183.155225

Mar 2 (Hopkins/Berg) scribe notes:

Ravi Sandhu and Pierangela Samarati

Access Control: Principles and Practice

IEEE Communications Magazine, 1994

http://citeseer.ist.psu.edu/sandhu94access.html

R. Sandhu et. al.
Role-Based Access Control Models
IEEE Computer, Vol. 29, No. 2, Feb 1996.

http://citeseer.ist.psu.edu/sandhu96rolebased.html

Sejong Oh and Ravi Sandhu
A model for role administration using organization structure

Proceedings of the seventh ACM symposium on Access control models and technologies, 2002

http://doi.acm.org/10.1145/507711.507737

Apr 18 (Mira Meyerovich/Fisher) scribe notes:

Gustaf Neumann and Mark Strembeck
An approach to engineer and enforce context constraints in an RBAC environment
http://portal.acm.org/citation.cfm?doid=775421

Elisa Bertino, Piero Andrea Bonatti and Elena Ferrari
TRBAC: A temporal role-based access control model
http://portal.acm.org/citation.cfm?doid=501978.501979


Policy Analysis

Mar 7 (Ge/Eddon) scribe notes:

Michael A. Harrison, Walter L. Ruzzo, and Jeffrey D. Ullman
Protection in operating systems
Communications of the ACM, 1976
http://doi.acm.org/10.1145/360303.360333

Mar 9 (Kupcu/Fisher) scribe notes:

Apu Kapadia, Geetanjali Sampemane, and Roy H. Campbell

Know Why Your Access was Denied: Regulating Feedback for Usable Security
CSS'04, 2004
http://choices.cs.uiuc.edu/~sampeman/papers/know-CCS.pdf


Refining Roles

Mar 21 (Fisher/Ge) scribe notes:

Jonathan D. Moffett and Emil C. Lupu

The uses of role hierarchies in access control
ACM workshop on Role-based access control, 1999
http://www.doc.ic.ac.uk/~ecl1/papers/rbac99.pdf


Information Flow

Mar 14 (Cooper/Tschantz):

Flow Analysis

Dorothy E. Denning
A Lattice Model of Secure Information Flow
Communications of the ACM
http://doi.acm.org/10.1145/360051.360056

Mar 16 (Marceau/Leo Meyerovich):

Guttman, Herzog, Ramsdell, Skorupka
Verifying Information Flow Goals in Security-Enhanced Linux
WITS 2003
http://www.ccs.neu.edu/home/guttman/selinux.ps

Mar 28, 30: Spring Recess

Apr 4 (Hopkins/---) scribe notes:

Riecke and Heintze
The SLAM Calculus: Programming with Secrecy and Integrity
Symposium on Principles of Programming Panguages, 1998
http://doi.acm.org/10.1145/268946.268976

Apr 6 (Leo Meyerovich/Leen) scribe notes:

A. Sabelfeld and A. C. Myers

Language-Based Information-Flow Security
IEEE Journal on Selected Areas in Communications, vol. 21, no. 1, January 2003
http://www.cs.cornell.edu/andru/papers/jsac/sm-jsac03.pdf

Implementation of Secure Systems
Fred B. Schneider, Greg Morrisett, and Robert Harper
A Language-Based Approach to Security
2000
http://citeseer.ist.psu.edu/schneider00languagebased.html


Trust Management

Apr 11 (Triandopoulos/Kupcu) scribe notes:

Marianne Winslett

An Introduction to Trust Negotiation
iTrust 2003
http://dais.cs.uiuc.edu/pubs/winslett/itrust03.ps

Blaze, Feigenbaum, and Lacy
Decentralized Trust Management
1996
http://citeseer.ist.psu.edu/blaze96decentralized.html

Apr 13 (Arnaudov/Triandopoulos) scribe notes:

N. Li, J.C. Mitchell, and W.H. Winsborough
Design of a Role-based Trust-management Framework
IEEE Symp. on Security and Privacy, Oakland, May 2002
http://crypto.stanford.edu/~ninghui/papers/rt_oakland02.pdf

Apr 27 (Ge/Berg) scribe notes:

Ninghui Li and Mahesh V. Tripunitara
Security Analysis in Role-Based Access Control
Proceedings of the Ninth ACM Symposium on Access Control Models and Techniques (SACMAT 2004)
http://www.cs.purdue.edu/homes/ninghui/papers/rbac_analysis_sacmat04.pdf


Secure Linux

Apr 25 (Arnaudov/Kupcu) scribe notes:

Peter Loscocco and Stephen Smalley
Integrating Flexible Support for Security Policies into the Linux Operationg System
Usenix 2001 Freenix Track
http://www.nsa.gov/selinux/papers/freenix01.pdf

Chris Wright, Crispin Cowan, Stephen Smalley, James Morris, Greg Kroah-Hartman
Linux Security Modules: General Security Support for the Linux Kernel
Usenix Security 2002
http://lsm.immunix.org/docs/lsm-usenix-2002/lsm.pdf