CSC 474/574 Information Systems Security

Size: px
Start display at page:

Download "CSC 474/574 Information Systems Security"

Transcription

1 CSC 474/574 Information Systems Security Topic 4.2: Lattice Based Access Control Models CSC 474/574 Dr. Peng Ning 1 LATTICE-BASED MODELS Information flow policies Denning s axioms Bell-LaPadula model (BLP) Biba model and its duality (or equivalence) to BLP CSC 474/574 Dr. Peng Ning 2

2 Information Flow Policies Concerned with the flow of information from one security class to another. Not between objects Does such a policy care about Information from top secret class to secret class? Information from file A to file B? Approach Assign each object a security class (also called a security label). Control information flow between objects based on their labels. Information flows from security class A to security class B Information flows from an object labeled A to an object labeled B. CSC 474/574 Dr. Peng Ning 3 Denning s Definition of Information Flow Policy < SC,, > SC set of security classes SC X SC flow relation (i.e., can-flow) : SC X SC SC class-combining operator Intuitions: A B: Information can flow from security class A to security class B. A B C: Information combined from A and B can flow to C. CSC 474/574 Dr. Peng Ning 4

3 Example 1 High-low policy Information can only flow between each class and from low class to high class, but not from high class to low class In Denning s formalism: SC={H, L} ={,, } ={H H=, H L=, L H=, L L= } CSC 474/574 Dr. Peng Ning 5 Example 2 Policy Two departments A and B. Four security classes {}: Public information {A}: Only people working in A can access {B}: Only people working in B can access. {A, B}: Only people working in both A and B can access. Never disclose any secret information. In Denning s formalism: SC = {,,, } ={,,,,,,,, } ={,,,,, } CSC 474/574 Dr. Peng Ning 6

4 DENNING'S AXIOMS < SC,, > 1. SC is finite 2. is a partial order on SC 3. SC has a lower bound L such that L A for all A SC 4. is a totally defined least upper bound operator on SC CSC 474/574 Dr. Peng Ning 7 DENNING'S AXIOMS (Cont d) Axiom 2: is a partial order on SC is reflexive: For all A in SC, A A. Intuition: Information can flow within each class. is transitive: If A B and B C, then A C. Intuition: If indirect flow is possible from A to C via B, then we should allow directly information flow from A to C. Not always desirable. is anti-symmetric: If A B and B A, then A=B. Intuition: We don t need redundant classes. Equivalently, if A B and A!=B, then B! A. CSC 474/574 Dr. Peng Ning 8

5 Example 3 Which of the following are partial orders? {A, B, C}, A B, B C, A C {A, B, C}, A A, B B, C C {A, B, C}, A A, B B, C C, A B CSC 474/574 Dr. Peng Ning 9 DENNING'S AXIOMS (Cont d) Axiom 3: SC has a lower bound L such that L A for all A in SC. Existence of public information in the system. CSC 474/574 Dr. Peng Ning 10

6 DENNING'S AXIOMS (Cont d) Axiom 4: is a totally defined least upper bound (lub) operator on SC A B is defined for each pair of A and B in SC. Intuition: It is possible to combine information from any two classes. The operator is a least upper bound A A B and B A B for all A, B in SC If A C and B C, then A B C. A B is the least one among all the upper bounds of A and B. The operator can be applied to any number of security classes. CSC 474/574 Dr. Peng Ning 11 DENNING'S AXIOMS IMPLY SC is a universally bounded lattice there exists a Greatest Lower Bound (glb) operator (also called meet) there exists a highest security class H CSC 474/574 Dr. Peng Ning 12

7 LATTICE STRUCTURES reflexive and transitive edges are implied but not shown Top Secret Secret Hierarchical Classes Confidential canflow Unclassified CSC 474/574 Dr. Peng Ning 13 LATTICE STRUCTURES Top Secret Secret Confidential dominance can-flow Unclassified CSC 474/574 Dr. Peng Ning 14

8 Categories and Compartments Categories: individual elements Compartments: set of categories. The set of compartments is the power set of the set of categories. Compartments form a subset lattice over the set of categories. Example: The set of categories: {A, B} The set of Compartments: {,,, } CSC 474/574 Dr. Peng Ning 15 LATTICE STRUCTURES Compartments and Categories {ARMY, CRYPTO} {ARMY } {CRYPTO} {} CSC 474/574 Dr. Peng Ning 16

9 LATTICE STRUCTURES {ARMY, NUCLEAR, CRYPTO} Compartments and Categories {ARMY, NUCLEAR} {ARMY, CRYPTO} {NUCLEAR, CRYPTO} {ARMY} {NUCLEAR} {CRYPTO} {} CSC 474/574 Dr. Peng Ning 17 Combining Different Lattices Two lattices L1= (SC1,, ) and L2 = (SC2,, ) can be combined into L = (SC,, ) as follows: SC = SC1 SC2 Intuition: The result security classes are all combinations of those in L1 and L2. For (c1, c2) and (c1, c2 ) in SC, (c1, c2) (c1, c2 ) if and only if c1 c1 and c2 c2. Intuition: Information can flow from (c1, c2) to (c1, c2 ) if and only if L1 permits information flow from c1 to c1 and L2 permits information flow from c2 to c2 (c1, c2) (c1, c2 ) = (c1 c1, c2 c2 ). Intuition: Combining security classes in L is equivalent to combining security classes in L1 and L2 separately. CSC 474/574 Dr. Peng Ning 18

10 LATTICE STRUCTURES Combined Lattice: TS {A,B} {A} {B} S {} The product of the two lattices. CSC 474/574 Dr. Peng Ning 19 SMITH'S LATTICE With large lattices a vanishingly small fraction of the labels will actually be used Smith's lattice: 4 hierarchical levels, 8 categatories, therefore number of possible labels = 4*2^8 = 1024 Only 21 labels are actually used (2%) Consider 16 hierarchical levels, 64 compartments which gives 10^20 labels CSC 474/574 Dr. Peng Ning 20

11 TS-AKLQWXYZ TS-KL TS-KLX TS-KY TS-KQZ TS-W TS-X TS-L TS-K TS-Y TS-Q TS-Z TS-X S-LW S-L TS S-W S C U S-A SMITH'S LATTICE EMBEDDING A POSET IN A LATTICE Smith's subset of 21 labels do form a lattice. In general, however, selecting a subset of labels from a given lattice may not yield a lattice, but is guaranteed to yield a partial ordering Given a partial ordering we can always add extra labels to make it a lattice CSC 474/574 Dr. Peng Ning 22

12 EMBEDDING A POSET IN A LATTICE {A,B,C,D} {A,B,C} {A,B,D} {A,B,C} {A,B,D} {A,B} {A} {B} {A} {B} such embedding is always possible {} CSC 474/574 Dr. Peng Ning 23 BELL LAPADULA (BLP) MODEL SIMPLE-SECURITY Subject S can read object O only if label(s) dominates label(o) information can flow from label(o) to label(s) STAR-PROPERTY Subject S can write object O only if label(o) dominates label(s) information can flow from label(s) to label(o) CSC 474/574 Dr. Peng Ning 24

13 STAR-PROPERTY applies to subjects (principals) not to users users are trusted (must be trusted) not to disclose secret information outside of the computer system subjects are not trusted because they may have Trojan Horses embedded in the code they execute star-property prevents overt leakage of information and does not address the covert channel problem CSC 474/574 Dr. Peng Ning 25 BLP MODEL Top Secret Secret Confidential dominance can-flow Unclassified CSC 474/574 Dr. Peng Ning 26

14 BIBA MODEL High Integrity Some Integrity Suspicious dominance can-flow Garbage CSC 474/574 Dr. Peng Ning 27 BIBA MODEL SIMPLE-INTEGRITY Subject S can read object O only if label(o) dominates label(s) information can flow from label(o) to label(s) STAR-PROPERTY Subject S can write object O only if label(s) dominates label(o) information can flow from label(s) to label(o) CSC 474/574 Dr. Peng Ning 28

15 EQUIVALENCE OF BLP AND BIBA Information flow in the Biba model is from top to bottom Information flow in the BLP model is from bottom to top Since top and bottom are relative terms, the two models are fundamentally equivalent CSC 474/574 Dr. Peng Ning 29 EQUIVALENCE OF BLP AND BIBA HI (High Integrity) LI (Low Integrity) LI (Low Integrity) HI (High Integrity) BIBA LATTICE EQUIVALENT BLP LATTICE CSC 474/574 Dr. Peng Ning 30

16 EQUIVALENCE OF BLP AND BIBA HS (High Secrecy) LS (Low Secrecy) LS (Low Secrecy) HS (High Secrecy) BLP LATTICE EQUIVALENT BIBA LATTICE CSC 474/574 Dr. Peng Ning 31 COMBINATION OF DISTINCT LATTICES HS HI HS, LI HS, HI LS, LI LS LI LS, HI BLP GIVEN BIBA EQUIVALENT BLP LATTICE CSC 474/574 Dr. Peng Ning 32

17 LIPNER'S LATTICE S: System Managers O: Audit Trail S: System Control S: Repair S: Production Users O: Production Data S: Application Programmers O: Development Code and Data S: System Programmers O: System Code in Development O: Repair Code O: Production Code O: Tools LEGEND O: System Programs S: Subjects O: Objects LIPNER'S LATTICE Lipner's lattice uses 9 labels from a possible space of 192 labels (3 integrity levels, 2 integrity compartments, 2 confidentiality levels, and 3 confidentiality compartments) The single lattice shown here can be constructed directly from first principles CSC 474/574 Dr. Peng Ning 34

18 LIPNER'S LATTICE The position of the audit trail at lowest integrity demonstrates the limitation of an information flow approach to integrity System control subjects are exempted from the star-property and allowed to write down (with respect to confidentiality) or equivalently write up (with respect to integrity) CSC 474/574 Dr. Peng Ning 35

TOPIC LATTICE-BASED ACCESS-CONTROL MODELS. Ravi Sandhu

TOPIC LATTICE-BASED ACCESS-CONTROL MODELS. Ravi Sandhu 1 TOPIC LATTICE-BASED ACCESS-CONTROL MODELS Ravi Sandhu 2 LATTICE-BASED MODELS Denning's axioms Bell-LaPadula model (BLP) Biba model and its duality (or equivalence) to BLP Dynamic labels in BLP 3 DENNING'S

More information

Lattice Model of Flow

Lattice Model of Flow Lattice Model of Flow CS4605 George W. Dinolt Taken From Denning s A Lattice Model of Secure Information Flow, Communications of the ACM, Vol 19, #5, May, 1976 The Plan The Elements of the Model The Flow

More information

Lattices and the Knaster-Tarski Theorem

Lattices and the Knaster-Tarski Theorem Lattices and the Knaster-Tarski Theorem Deepak D Souza Department of Computer Science and Automation Indian Institute of Science, Bangalore. 8 August 27 Outline 1 Why study lattices 2 Partial Orders 3

More information

The illustrated zoo of order-preserving functions

The illustrated zoo of order-preserving functions The illustrated zoo of order-preserving functions David Wilding, February 2013 http://dpw.me/mathematics/ Posets (partially ordered sets) underlie much of mathematics, but we often don t give them a second

More information

Generating all modular lattices of a given size

Generating all modular lattices of a given size Generating all modular lattices of a given size ADAM 2013 Nathan Lawless Chapman University June 6-8, 2013 Outline Introduction to Lattice Theory: Modular Lattices The Objective: Generating and Counting

More information

EDA045F: Program Analysis LECTURE 3: DATAFLOW ANALYSIS 2. Christoph Reichenbach

EDA045F: Program Analysis LECTURE 3: DATAFLOW ANALYSIS 2. Christoph Reichenbach EDA045F: Program Analysis LECTURE 3: DATAFLOW ANALYSIS 2 Christoph Reichenbach In the last lecture... Eliminating Nested Expressions (Three-Address Code) Control-Flow Graphs Static Single Assignment Form

More information

Mathematics Notes for Class 12 chapter 1. Relations and Functions

Mathematics Notes for Class 12 chapter 1. Relations and Functions 1 P a g e Mathematics Notes for Class 12 chapter 1. Relations and Functions Relation If A and B are two non-empty sets, then a relation R from A to B is a subset of A x B. If R A x B and (a, b) R, then

More information

Chair of Communications Theory, Prof. Dr.-Ing. E. Jorswieck. Übung 5: Supermodular Games

Chair of Communications Theory, Prof. Dr.-Ing. E. Jorswieck. Übung 5: Supermodular Games Chair of Communications Theory, Prof. Dr.-Ing. E. Jorswieck Übung 5: Supermodular Games Introduction Supermodular games are a class of non-cooperative games characterized by strategic complemetariteis

More information

Recall: Data Flow Analysis. Data Flow Analysis Recall: Data Flow Equations. Forward Data Flow, Again

Recall: Data Flow Analysis. Data Flow Analysis Recall: Data Flow Equations. Forward Data Flow, Again Data Flow Analysis 15-745 3/24/09 Recall: Data Flow Analysis A framework for proving facts about program Reasons about lots of little facts Little or no interaction between facts Works best on properties

More information

An orderly algorithm to enumerate finite (semi)modular lattices

An orderly algorithm to enumerate finite (semi)modular lattices An orderly algorithm to enumerate finite (semi)modular lattices BLAST 23 Chapman University October 6, 23 Outline The original algorithm: Generating all finite lattices Generating modular and semimodular

More information

Maximizing Winnings on Final Jeopardy!

Maximizing Winnings on Final Jeopardy! Maximizing Winnings on Final Jeopardy! Jessica Abramson, Natalie Collina, and William Gasarch August 2017 1 Introduction Consider a final round of Jeopardy! with players Alice and Betty 1. We assume that

More information

Pure vs. Mixed Motive Games: On the Perception of Payoff-Orders

Pure vs. Mixed Motive Games: On the Perception of Payoff-Orders Pure vs. Mixed Motive Games: On the Perception of Payoff-Orders Burkhard C. Schipper Dept. of Economics, University of Bonn preliminary and incomplete version: June 20, 2001 Abstract I study the payoff

More information

Algebra homework 8 Homomorphisms, isomorphisms

Algebra homework 8 Homomorphisms, isomorphisms MATH-UA.343.005 T.A. Louis Guigo Algebra homework 8 Homomorphisms, isomorphisms For every n 1 we denote by S n the n-th symmetric group. Exercise 1. Consider the following permutations: ( ) ( 1 2 3 4 5

More information

Introduction to Priestley duality 1 / 24

Introduction to Priestley duality 1 / 24 Introduction to Priestley duality 1 / 24 2 / 24 Outline What is a distributive lattice? Priestley duality for finite distributive lattices Using the duality: an example Priestley duality for infinite distributive

More information

Maximizing Winnings on Final Jeopardy!

Maximizing Winnings on Final Jeopardy! Maximizing Winnings on Final Jeopardy! Jessica Abramson, Natalie Collina, and William Gasarch August 2017 1 Abstract Alice and Betty are going into the final round of Jeopardy. Alice knows how much money

More information

David Oliver Senior Manager Compliance

David Oliver Senior Manager Compliance Jersey Financial Services Commission David Oliver Senior Manager Compliance Jersey Financial Services Commission Common Compliance Difficulties (2) leading to increased operational risk Know your customer

More information

CSC Advanced Scientific Programming, Spring Descriptive Statistics

CSC Advanced Scientific Programming, Spring Descriptive Statistics CSC 223 - Advanced Scientific Programming, Spring 2018 Descriptive Statistics Overview Statistics is the science of collecting, organizing, analyzing, and interpreting data in order to make decisions.

More information

6.231 DYNAMIC PROGRAMMING LECTURE 3 LECTURE OUTLINE

6.231 DYNAMIC PROGRAMMING LECTURE 3 LECTURE OUTLINE 6.21 DYNAMIC PROGRAMMING LECTURE LECTURE OUTLINE Deterministic finite-state DP problems Backward shortest path algorithm Forward shortest path algorithm Shortest path examples Alternative shortest path

More information

Bank Secrecy Act Credit Union Training for Board Members and other Volunteers. Overview. Overview. Overview of Money Laundering and Financial Crime

Bank Secrecy Act Credit Union Training for Board Members and other Volunteers. Overview. Overview. Overview of Money Laundering and Financial Crime Bank Secrecy Act Credit Union Training for Board Members and other Volunteers Overview Overview of Money Laundering and Financial Crime The Bank Secrecy Act The Role of the Board and Supervisory Committee

More information

ECON 214 Elements of Statistics for Economists 2016/2017

ECON 214 Elements of Statistics for Economists 2016/2017 ECON 214 Elements of Statistics for Economists 2016/2017 Topic The Normal Distribution Lecturer: Dr. Bernardin Senadza, Dept. of Economics bsenadza@ug.edu.gh College of Education School of Continuing and

More information

Quadrant marked mesh patterns in 123-avoiding permutations

Quadrant marked mesh patterns in 123-avoiding permutations Quadrant marked mesh patterns in 23-avoiding permutations Dun Qiu Department of Mathematics University of California, San Diego La Jolla, CA 92093-02. USA duqiu@math.ucsd.edu Jeffrey Remmel Department

More information

Lecture Slides. Elementary Statistics Tenth Edition. by Mario F. Triola. and the Triola Statistics Series. Slide 1

Lecture Slides. Elementary Statistics Tenth Edition. by Mario F. Triola. and the Triola Statistics Series. Slide 1 Lecture Slides Elementary Statistics Tenth Edition and the Triola Statistics Series by Mario F. Triola Slide 1 Chapter 6 Normal Probability Distributions 6-1 Overview 6-2 The Standard Normal Distribution

More information

10. Lessons From Capital Market History

10. Lessons From Capital Market History 10. Lessons From Capital Market History Chapter Outline How to measure returns The lessons from the capital market history Return: Expected returns Risk: the variability of returns 1 1 Risk, Return and

More information

How Wealthy Are Europeans?

How Wealthy Are Europeans? How Wealthy Are Europeans? Grades: 7, 8, 11, 12 (course specific) Description: Organization of data of to examine measures of spread and measures of central tendency in examination of Gross Domestic Product

More information

Simplifying Fractions.notebook February 28, 2013

Simplifying Fractions.notebook February 28, 2013 1 Fractions may have numerators and/or denominators that are composite numbers (numbers that have more factors than one and itself). When this is the case, fractions can be simplified to their lowest term.

More information

Risk Management for Distributed Authorization

Risk Management for Distributed Authorization Risk Management for Distributed Authorization Christian Skalka University of Vermont Peter Chapin University of Vermont X. Sean Wang University of Vermont Abstract Distributed authorization takes into

More information

Local Government Pay

Local Government Pay Local Government Pay 2018-2020 GMB Briefing WELCOME! Background Final 2018-20 Local Government pay offer now on the table. London Employers have provided a similar response for Inner/Outer London. Green

More information

Multi-armed bandit problems

Multi-armed bandit problems Multi-armed bandit problems Stochastic Decision Theory (2WB12) Arnoud den Boer 13 March 2013 Set-up 13 and 14 March: Lectures. 20 and 21 March: Paper presentations (Four groups, 45 min per group). Before

More information

Filters - Part II. Quotient Lattices Modulo Filters and Direct Product of Two Lattices

Filters - Part II. Quotient Lattices Modulo Filters and Direct Product of Two Lattices FORMALIZED MATHEMATICS Vol2, No3, May August 1991 Université Catholique de Louvain Filters - Part II Quotient Lattices Modulo Filters and Direct Product of Two Lattices Grzegorz Bancerek Warsaw University

More information

13.3. Annual Percentage Rate (APR) and the Rule of 78

13.3. Annual Percentage Rate (APR) and the Rule of 78 13.3. Annual Percentage Rate (APR) and the Rule of 78 Objectives A. Find the APR of a loan. B. Use the rule of 78 to find the refund and payoff of a loan. C. Find the monthly payment for a loan using an

More information

Multiagent Systems. Multiagent Systems General setting Division of Resources Task Allocation Resource Allocation. 13.

Multiagent Systems. Multiagent Systems General setting Division of Resources Task Allocation Resource Allocation. 13. Multiagent Systems July 16, 2014 13. Bargaining Multiagent Systems 13. Bargaining B. Nebel, C. Becker-Asano, S. Wölfl Albert-Ludwigs-Universität Freiburg July 16, 2014 13.1 General setting 13.2 13.3 13.4

More information

Gödel algebras free over finite distributive lattices

Gödel algebras free over finite distributive lattices TANCL, Oxford, August 4-9, 2007 1 Gödel algebras free over finite distributive lattices Stefano Aguzzoli Brunella Gerla Vincenzo Marra D.S.I. D.I.COM. D.I.C.O. University of Milano University of Insubria

More information

TRADE ANALYSIS. August 2017 Performance

TRADE ANALYSIS. August 2017 Performance EUR/AUD SHORT Entry Date 01/08/2017 Entry point 1.4930 Stop-Loss 1.4980 Risk-Reward Ratio 14 Target 1.4230 As indicated on the chart we can see that the pair previously reversed to the downside between

More information

Statistical Intervals. Chapter 7 Stat 4570/5570 Material from Devore s book (Ed 8), and Cengage

Statistical Intervals. Chapter 7 Stat 4570/5570 Material from Devore s book (Ed 8), and Cengage 7 Statistical Intervals Chapter 7 Stat 4570/5570 Material from Devore s book (Ed 8), and Cengage Confidence Intervals The CLT tells us that as the sample size n increases, the sample mean X is close to

More information

1 FUNDAMENTALS OF LOGIC NO.5 SOUNDNESS AND COMPLETENESS Tatsuya Hagino hagino@sfc.keio.ac.jp lecture URL https://vu5.sfc.keio.ac.jp/slide/ 2 So Far Propositional Logic Logical Connectives(,,, ) Truth Table

More information

Competition for goods in buyer-seller networks

Competition for goods in buyer-seller networks Rev. Econ. Design 5, 301 331 (2000) c Springer-Verlag 2000 Competition for goods in buyer-seller networks Rachel E. Kranton 1, Deborah F. Minehart 2 1 Department of Economics, University of Maryland, College

More information

Bond Percolation Critical Probability Bounds. for three Archimedean lattices:

Bond Percolation Critical Probability Bounds. for three Archimedean lattices: Bond Percolation Critical Probability Bounds for Three Archimedean Lattices John C Wierman Mathematical Sciences Department Johns Hopkins University Abstract Rigorous bounds for the bond percolation critical

More information

3.2 No-arbitrage theory and risk neutral probability measure

3.2 No-arbitrage theory and risk neutral probability measure Mathematical Models in Economics and Finance Topic 3 Fundamental theorem of asset pricing 3.1 Law of one price and Arrow securities 3.2 No-arbitrage theory and risk neutral probability measure 3.3 Valuation

More information

Lecture l(x) 1. (1) x X

Lecture l(x) 1. (1) x X Lecture 14 Agenda for the lecture Kraft s inequality Shannon codes The relation H(X) L u (X) = L p (X) H(X) + 1 14.1 Kraft s inequality While the definition of prefix-free codes is intuitively clear, we

More information

Smart Phone. SECONDARY School Module ACTIVITY BOOKLET

Smart Phone. SECONDARY School Module ACTIVITY BOOKLET ACTIVITY BOOKLET Smart Phone AFOA Canada acknowledges the generous support of the TD Bank Group in making this project possible. All rights reserved. No part of this publication may be reproduced or transmitted

More information

Reputation and Signaling in Asset Sales: Internet Appendix

Reputation and Signaling in Asset Sales: Internet Appendix Reputation and Signaling in Asset Sales: Internet Appendix Barney Hartman-Glaser September 1, 2016 Appendix D. Non-Markov Perfect Equilibrium In this appendix, I consider the game when there is no honest-type

More information

ECON Micro Foundations

ECON Micro Foundations ECON 302 - Micro Foundations Michael Bar September 13, 2016 Contents 1 Consumer s Choice 2 1.1 Preferences.................................... 2 1.2 Budget Constraint................................ 3

More information

CTL Model Checking. Goal Method for proving M sat σ, where M is a Kripke structure and σ is a CTL formula. Approach Model checking!

CTL Model Checking. Goal Method for proving M sat σ, where M is a Kripke structure and σ is a CTL formula. Approach Model checking! CMSC 630 March 13, 2007 1 CTL Model Checking Goal Method for proving M sat σ, where M is a Kripke structure and σ is a CTL formula. Approach Model checking! Mathematically, M is a model of σ if s I = M

More information

Optimal Voting Rules. Alexander Scheer. November 14, 2012

Optimal Voting Rules. Alexander Scheer. November 14, 2012 Optimal Voting Rules Alexander Scheer November 14, 2012 1 Introduction What we have seen in the last weeks: Borda's Count Condorcet's Paradox 2 Introduction What we have seen in the last weeks: Independence

More information

1) 17 11= 2) = 3) -9(-6) = 6) ) ) ) Find the 444. If necessary, round to the nearest tenth.

1) 17 11= 2) = 3) -9(-6) = 6) ) ) ) Find the 444. If necessary, round to the nearest tenth. SOL 7.3 Simplify each. 1) 17 11= 2) -100 + 5 = 3) -9(-6) = 4) SOL 8.5 Circle all of the following that are perfect squares. 256 49 16 21 64 1 98 81 76 400 5) How do you determine if a number is a perfect

More information

TEST 1 SOLUTIONS MATH 1002

TEST 1 SOLUTIONS MATH 1002 October 17, 2014 1 TEST 1 SOLUTIONS MATH 1002 1. Indicate whether each it below exists or does not exist. If the it exists then write what it is. No proofs are required. For example, 1 n exists and is

More information

While the story has been different in each case, fundamentally, we ve maintained:

While the story has been different in each case, fundamentally, we ve maintained: Econ 805 Advanced Micro Theory I Dan Quint Fall 2009 Lecture 22 November 20 2008 What the Hatfield and Milgrom paper really served to emphasize: everything we ve done so far in matching has really, fundamentally,

More information

Game Theory: Normal Form Games

Game Theory: Normal Form Games Game Theory: Normal Form Games Michael Levet June 23, 2016 1 Introduction Game Theory is a mathematical field that studies how rational agents make decisions in both competitive and cooperative situations.

More information

Capital Gain or Loss. Pub 4012 Tab D Pub 4491 Lesson 11

Capital Gain or Loss. Pub 4012 Tab D Pub 4491 Lesson 11 Capital Gain or Loss Pub 4012 Tab D Pub 4491 Lesson 11 Introduction Ordinary income tax rates range from 10% to 37% Capital gain tax rates are much lower Usually 0% or 15% rate Could be 20% rate for very

More information

Elements of Patentability. Exclude Others. Patent Law, Fall 2016, Vetter 1

Elements of Patentability. Exclude Others. Patent Law, Fall 2016, Vetter 1 The elements of Patentability Patentable subject matter, i.e., patent eligibility Useful/utility (operable and provides a tangible benefit) New (novelty, anticipation) Nonobvious (not readily within the

More information

CH 5 Normal Probability Distributions Properties of the Normal Distribution

CH 5 Normal Probability Distributions Properties of the Normal Distribution Properties of the Normal Distribution Example A friend that is always late. Let X represent the amount of minutes that pass from the moment you are suppose to meet your friend until the moment your friend

More information

arxiv: v1 [math.lo] 24 Feb 2014

arxiv: v1 [math.lo] 24 Feb 2014 Residuated Basic Logic II. Interpolation, Decidability and Embedding Minghui Ma 1 and Zhe Lin 2 arxiv:1404.7401v1 [math.lo] 24 Feb 2014 1 Institute for Logic and Intelligence, Southwest University, Beibei

More information

Chapter 4. The Normal Distribution

Chapter 4. The Normal Distribution Chapter 4 The Normal Distribution 1 Chapter 4 Overview Introduction 4-1 Normal Distributions 4-2 Applications of the Normal Distribution 4-3 The Central Limit Theorem 4-4 The Normal Approximation to the

More information

AS/ECON 2350 S2 N Answers to Mid term Exam July time : 1 hour. Do all 4 questions. All count equally.

AS/ECON 2350 S2 N Answers to Mid term Exam July time : 1 hour. Do all 4 questions. All count equally. AS/ECON 2350 S2 N Answers to Mid term Exam July 2017 time : 1 hour Do all 4 questions. All count equally. Q1. Monopoly is inefficient because the monopoly s owner makes high profits, and the monopoly s

More information

0.1 Equivalence between Natural Deduction and Axiomatic Systems

0.1 Equivalence between Natural Deduction and Axiomatic Systems 0.1 Equivalence between Natural Deduction and Axiomatic Systems Theorem 0.1.1. Γ ND P iff Γ AS P ( ) it is enough to prove that all axioms are theorems in ND, as MP corresponds to ( e). ( ) by induction

More information

ECON 214 Elements of Statistics for Economists

ECON 214 Elements of Statistics for Economists ECON 214 Elements of Statistics for Economists Session 7 The Normal Distribution Part 1 Lecturer: Dr. Bernardin Senadza, Dept. of Economics Contact Information: bsenadza@ug.edu.gh College of Education

More information

16 MAKING SIMPLE DECISIONS

16 MAKING SIMPLE DECISIONS 247 16 MAKING SIMPLE DECISIONS Let us associate each state S with a numeric utility U(S), which expresses the desirability of the state A nondeterministic action A will have possible outcome states Result

More information

Essays on Some Combinatorial Optimization Problems with Interval Data

Essays on Some Combinatorial Optimization Problems with Interval Data Essays on Some Combinatorial Optimization Problems with Interval Data a thesis submitted to the department of industrial engineering and the institute of engineering and sciences of bilkent university

More information

The Criminal Finances Act 2017: The Six Guiding Principles to Inform Prevention Procedures

The Criminal Finances Act 2017: The Six Guiding Principles to Inform Prevention Procedures The Criminal Finances Act 2017: The Six Guiding Principles to Inform Prevention Procedures The Criminal Finances Act introduces two new offences (the first relating to the UK and the other to a foreign

More information

Iterated Dominance and Nash Equilibrium

Iterated Dominance and Nash Equilibrium Chapter 11 Iterated Dominance and Nash Equilibrium In the previous chapter we examined simultaneous move games in which each player had a dominant strategy; the Prisoner s Dilemma game was one example.

More information

An implementation of the Chinese Wall security model using ConSA

An implementation of the Chinese Wall security model using ConSA An implementation of the Chinese Wall security model using ConSA Frans Lategan Martin S Olivier March 1998 Abstract Although security models abound, they are usually an integral part of the system or a

More information

Statistics for Business and Economics: Random Variables:Continuous

Statistics for Business and Economics: Random Variables:Continuous Statistics for Business and Economics: Random Variables:Continuous STT 315: Section 107 Acknowledgement: I d like to thank Dr. Ashoke Sinha for allowing me to use and edit the slides. Murray Bourne (interactive

More information

Before I address the harmonic patterns and harmonic ratios that exist in the market, I need to address the Fibonacci series and Fibonacci ratios.

Before I address the harmonic patterns and harmonic ratios that exist in the market, I need to address the Fibonacci series and Fibonacci ratios. Full Trading Circle: The Complete Underground Trader System By Jea Yu Copyright 2010 by Jea Yu APPENDIX A HARMONIC PATTERN TRADING by Suri Duddella of Surinotes.com Financial markets exhibit the natural

More information

White-Box Testing Techniques I

White-Box Testing Techniques I White-Box Testing Techniques I Software Testing and Verification Lecture 7 Prepared by Stephen M. Thebaut, Ph.D. University of Florida Definition of White-Box Testing Testing based on analysis of internal

More information

ECO220Y Continuous Probability Distributions: Normal Readings: Chapter 9, section 9.10

ECO220Y Continuous Probability Distributions: Normal Readings: Chapter 9, section 9.10 ECO220Y Continuous Probability Distributions: Normal Readings: Chapter 9, section 9.10 Fall 2011 Lecture 8 Part 2 (Fall 2011) Probability Distributions Lecture 8 Part 2 1 / 23 Normal Density Function f

More information

YEAR 12 Trial Exam Paper FURTHER MATHEMATICS. Written examination 1. Worked solutions

YEAR 12 Trial Exam Paper FURTHER MATHEMATICS. Written examination 1. Worked solutions YEAR 12 Trial Exam Paper 2018 FURTHER MATHEMATICS Written examination 1 Worked solutions This book presents: worked solutions explanatory notes tips on how to approach the exam. This trial examination

More information

ACCUPLACER Elementary Algebra Assessment Preparation Guide

ACCUPLACER Elementary Algebra Assessment Preparation Guide ACCUPLACER Elementary Algebra Assessment Preparation Guide Please note that the guide is for reference only and that it does not represent an exact match with the assessment content. The Assessment Centre

More information

White-Box Testing Techniques I

White-Box Testing Techniques I White-Box Testing Techniques I Software Testing and Verification Lecture 7 Prepared by Stephen M. Thebaut, Ph.D. University of Florida Definition of White-Box Testing Testing based on analysis of internal

More information

6.231 DYNAMIC PROGRAMMING LECTURE 3 LECTURE OUTLINE

6.231 DYNAMIC PROGRAMMING LECTURE 3 LECTURE OUTLINE 6.21 DYNAMIC PROGRAMMING LECTURE LECTURE OUTLINE Deterministic finite-state DP problems Backward shortest path algorithm Forward shortest path algorithm Shortest path examples Alternative shortest path

More information

On the Balasubramanian-Koblitz Results

On the Balasubramanian-Koblitz Results On the Balasubramanian-Koblitz Results Palash Sarkar Applied Statistics Unit Indian Statistical Institute, Kolkata India palash@isical.ac.in Institute of Mathematical Sciences, 22 nd February 2012 As Part

More information

91.420/543: Artificial Intelligence UMass Lowell CS Fall 2010

91.420/543: Artificial Intelligence UMass Lowell CS Fall 2010 91.420/543: Artificial Intelligence UMass Lowell CS Fall 2010 Lecture 17 & 18: Markov Decision Processes Oct 12 13, 2010 A subset of Lecture 9 slides from Dan Klein UC Berkeley Many slides over the course

More information

2017 Fall QMS102 Tip Sheet 2

2017 Fall QMS102 Tip Sheet 2 Chapter 5: Basic Probability 2017 Fall QMS102 Tip Sheet 2 (Covering Chapters 5 to 8) EVENTS -- Each possible outcome of a variable is an event, including 3 types. 1. Simple event = Described by a single

More information

CONSTRUCTION OF CODES BY LATTICE VALUED FUZZY SETS. 1. Introduction. Novi Sad J. Math. Vol. 35, No. 2, 2005,

CONSTRUCTION OF CODES BY LATTICE VALUED FUZZY SETS. 1. Introduction. Novi Sad J. Math. Vol. 35, No. 2, 2005, Novi Sad J. Math. Vol. 35, No. 2, 2005, 155-160 CONSTRUCTION OF CODES BY LATTICE VALUED FUZZY SETS Mališa Žižović 1, Vera Lazarević 2 Abstract. To every finite lattice L, one can associate a binary blockcode,

More information

3 cups ¾ ½ ¼ 2 cups ¾ ½ ¼. 1 cup ¾ ½ ¼. 1 cup. 1 cup ¾ ½ ¼ ¾ ½ ¼. 1 cup. 1 cup ¾ ½ ¼ ¾ ½ ¼

3 cups ¾ ½ ¼ 2 cups ¾ ½ ¼. 1 cup ¾ ½ ¼. 1 cup. 1 cup ¾ ½ ¼ ¾ ½ ¼. 1 cup. 1 cup ¾ ½ ¼ ¾ ½ ¼ 3 cups cups cup Fractions are a form of division. When I ask what is 3/ I am asking How big will each part be if I break 3 into equal parts? The answer is. This a fraction. A fraction is part of a whole.

More information

MATH 5510 Mathematical Models of Financial Derivatives. Topic 1 Risk neutral pricing principles under single-period securities models

MATH 5510 Mathematical Models of Financial Derivatives. Topic 1 Risk neutral pricing principles under single-period securities models MATH 5510 Mathematical Models of Financial Derivatives Topic 1 Risk neutral pricing principles under single-period securities models 1.1 Law of one price and Arrow securities 1.2 No-arbitrage theory and

More information

Collective Profitability and Welfare in Selling-Buying Intermediation Processes

Collective Profitability and Welfare in Selling-Buying Intermediation Processes Collective Profitability and Welfare in Selling-Buying Intermediation Processes Amelia Bădică 1, Costin Bădică 1(B), Mirjana Ivanović 2, and Ionuţ Buligiu 1 1 University of Craiova, A. I. Cuza 13, 200530

More information

Lecture Notes on Bidirectional Type Checking

Lecture Notes on Bidirectional Type Checking Lecture Notes on Bidirectional Type Checking 15-312: Foundations of Programming Languages Frank Pfenning Lecture 17 October 21, 2004 At the beginning of this class we were quite careful to guarantee that

More information

MS&E 246: Lecture 5 Efficiency and fairness. Ramesh Johari

MS&E 246: Lecture 5 Efficiency and fairness. Ramesh Johari MS&E 246: Lecture 5 Efficiency and fairness Ramesh Johari A digression In this lecture: We will use some of the insights of static game analysis to understand efficiency and fairness. Basic setup N players

More information

Segmenting the audit universe

Segmenting the audit universe Segmenting the audit universe Janette Smith, Head of Audit, Products, Sales and Servicing, Nationwide Building Society Ian Hersey, Head of Audit Methodology, Lloyds Banking Group Introduction Key points

More information

Bargaining and Coalition Formation

Bargaining and Coalition Formation 1 These slides are based largely on chapter 2 of Osborne and Rubenstein (1990), Bargaining and Markets Bargaining and Coalition Formation Dr James Tremewan (james.tremewan@univie.ac.at) 1 The Bargaining

More information

Strategies and Nash Equilibrium. A Whirlwind Tour of Game Theory

Strategies and Nash Equilibrium. A Whirlwind Tour of Game Theory Strategies and Nash Equilibrium A Whirlwind Tour of Game Theory (Mostly from Fudenberg & Tirole) Players choose actions, receive rewards based on their own actions and those of the other players. Example,

More information

1.4. Arithmetic of Algebraic Fractions. Introduction. Prerequisites. Learning Outcomes

1.4. Arithmetic of Algebraic Fractions. Introduction. Prerequisites. Learning Outcomes Arithmetic of Algebraic Fractions 1.4 Introduction Just as one whole number divided by another is called a numerical fraction, so one algebraic expression divided by another is known as an algebraic fraction.

More information

Technical Appendix to Long-Term Contracts under the Threat of Supplier Default

Technical Appendix to Long-Term Contracts under the Threat of Supplier Default 0.287/MSOM.070.099ec Technical Appendix to Long-Term Contracts under the Threat of Supplier Default Robert Swinney Serguei Netessine The Wharton School, University of Pennsylvania, Philadelphia, PA, 904

More information

Shifting and rescaling data distributions

Shifting and rescaling data distributions Shifting and rescaling data distributions It is useful to consider the effect of systematic alterations of all the values in a data set. The simplest such systematic effect is a shift by a fixed constant.

More information

Report for UCU A comparison of USS with TPS Hilary Salt FIA Derek Benstead FIA 11 May 2017

Report for UCU A comparison of USS with TPS Hilary Salt FIA Derek Benstead FIA 11 May 2017 Report for UCU A comparison of USS with TPS Hilary Salt FIA Derek Benstead FIA 11 May 2017 Regulated in the UK by the Institute and Faculty of Actuaries in respect of a range of investment business activities.

More information

February 2010 Office of the Deputy Assistant Secretary of the Army for Cost & Economics (ODASA-CE)

February 2010 Office of the Deputy Assistant Secretary of the Army for Cost & Economics (ODASA-CE) U.S. ARMY COST ANALYSIS HANDBOOK SECTION 12 COST RISK AND UNCERTAINTY ANALYSIS February 2010 Office of the Deputy Assistant Secretary of the Army for Cost & Economics (ODASA-CE) TABLE OF CONTENTS 12.1

More information

FSM Optimization. Outline. FSM State Minimization. Some Definitions. Methods 10/14/2015

FSM Optimization. Outline. FSM State Minimization. Some Definitions. Methods 10/14/2015 /4/25 C2: Digital Design http://jatinga.iitg.ernet.in/~asahu/cs22 FSM Optimization Outline FSM : State minimization Row Matching Method, Implication chart method, FSM Partitioning FSM Encoding: Random,

More information

Notes on the symmetric group

Notes on the symmetric group Notes on the symmetric group 1 Computations in the symmetric group Recall that, given a set X, the set S X of all bijections from X to itself (or, more briefly, permutations of X) is group under function

More information

A new tool for selecting your next project

A new tool for selecting your next project The Quantitative PICK Chart A new tool for selecting your next project Author Sean Scott, PMP, is an accomplished Project Manager at Perficient. He has over 20 years of consulting IT experience providing

More information

Chapter 2 Algebra Part 1

Chapter 2 Algebra Part 1 Chapter 2 Algebra Part 1 Section 2.1 Expansion (Revision) In Mathematics EXPANSION really means MULTIPLY. For example 3(2x + 4) can be expanded by multiplying them out. Remember: There is an invisible

More information

LECTURE 4: MULTIAGENT INTERACTIONS

LECTURE 4: MULTIAGENT INTERACTIONS What are Multiagent Systems? LECTURE 4: MULTIAGENT INTERACTIONS Source: An Introduction to MultiAgent Systems Michael Wooldridge 10/4/2005 Multi-Agent_Interactions 2 MultiAgent Systems Thus a multiagent

More information

Mock Examination 2010

Mock Examination 2010 [EC7086] Mock Examination 2010 No. of Pages: [7] No. of Questions: [6] Subject [Economics] Title of Paper [EC7086: Microeconomic Theory] Time Allowed [Two (2) hours] Instructions to candidates Please answer

More information

École normale supérieure, MPRI, M2 Year 2007/2008. Course 2-6 Abstract interpretation: application to verification and static analysis P.

École normale supérieure, MPRI, M2 Year 2007/2008. Course 2-6 Abstract interpretation: application to verification and static analysis P. École normale supérieure, MPRI, M2 Year 2007/2008 Course 2-6 Abstract interpretation: application to verification and static analysis P. Cousot Questions and answers of the partial exam of Friday November

More information

CATEGORICAL SKEW LATTICES

CATEGORICAL SKEW LATTICES CATEGORICAL SKEW LATTICES MICHAEL KINYON AND JONATHAN LEECH Abstract. Categorical skew lattices are a variety of skew lattices on which the natural partial order is especially well behaved. While most

More information

Shapley Allocation, Diversification and Services in Operational Risk

Shapley Allocation, Diversification and Services in Operational Risk Shapley Allocation, Diversification and Services in Operational Risk Frankfurt, March, 2015 Dr. Peter Mitic. Santander Bank (Head of Operational Risk Quantitative and Advanced Analytics UK) Disclaimer:

More information

Principles of Program Analysis: Algorithms

Principles of Program Analysis: Algorithms Principles of Program Analysis: Algorithms Transparencies based on Chapter 6 of the book: Flemming Nielson, Hanne Riis Nielson and Chris Hankin: Principles of Program Analysis. Springer Verlag 2005. c

More information

Expected Value of a Random Variable

Expected Value of a Random Variable Knowledge Article: Probability and Statistics Expected Value of a Random Variable Expected Value of a Discrete Random Variable You're familiar with a simple mean, or average, of a set. The mean value of

More information

ARGUMENTS AGAINST GRANTING TAX ABATEMENTS * June 2006

ARGUMENTS AGAINST GRANTING TAX ABATEMENTS * June 2006 ARGUMENTS AGAINST GRANTING TAX ABATEMENTS * June 2006 1. Tax abatements, or any other form of corporate welfare in which taxpayer money is used to subsidize private businesses, is anti-capitalist and is

More information

Chapter 4 Continuous Random Variables and Probability Distributions

Chapter 4 Continuous Random Variables and Probability Distributions Chapter 4 Continuous Random Variables and Probability Distributions Part 2: More on Continuous Random Variables Section 4.5 Continuous Uniform Distribution Section 4.6 Normal Distribution 1 / 27 Continuous

More information

Lecture 3. Sample spaces, events, probability

Lecture 3. Sample spaces, events, probability 18.440: Lecture 3 s, events, probability Scott Sheffield MIT 1 Outline Formalizing probability 2 Outline Formalizing probability 3 What does I d say there s a thirty percent chance it will rain tomorrow

More information