Are you an EPFL student looking for a semester project?
Work with us on data science and visualisation projects, and deploy your project as an app on top of Graph Search.
This lecture covers the principles of Mandatory Access Control (MAC) and Discretionary Access Control (DAC), explaining how MAC enforces security policies despite subversion attempts. It delves into security models, such as Bell-LaPadula for confidentiality and BIBA for integrity, illustrating how they work through examples. The Chinese Wall model is explored to prevent information flows between conflict sets, showcasing its application in real-world scenarios. Additionally, covert communication channels and the importance of sanitization in business contexts are discussed, emphasizing the need for security policies in various use cases.
This video is available exclusively on Mediaspace for a restricted audience. Please log in to MediaSpace to access it if you have the necessary permissions.
Watch on Mediaspace