Access control: Introduction, Attenuation of privileges, Trust and Assurance, Confinement problem, Security design principles, Identity Management models, local, Network, federal , global web identity, XNS approach for global Web identity, Centralized enterprise level Identity Management.
Elements of trust paradigms in computing, Third party approach to identity trust, Kerberos, Explicit third party authentication paradigm, PKI approach to trust establishment, Attribute certificates, Generalized web of trust models, Examples.
Mandatory access control, comparing information flow in BLP and BIBA models, Combining the BLP and BIBA models, Chinese wall problem.
Discretionary access control and Access matrix model, definitions, Safety problem, The take grant protection model, Schematic protection model, SPM rules and operations, Attenuating, Applications
Role based access control, Hierarchical Access Control, Mapping of a mandatory policy to RABC, Mapping discretionary control to RBAC, RBAC flow analysis, Separation of Duty in RBAC, RBAC consistency properties, The privileges perspective of separation of duties, Functional specification for RBAC.