<aside> 💡 Key Points
<aside> 📖 Security
Achieving some goals in the precence of adversaries
</aside>
Access control
Information flow security
A practical system needs both access and flow control to satisfy all security requirements. — D. Denning, 1976
<aside> 💡 Information flow: if the information in variable $x$ is transferred to variable $y$, then there is information flow $x → y$
</aside>
We can connect information flow to security, by:
Security levels can be modeled as lattice
The most basic model is two-level policy, for example: