# | date |
topic |
reading1 |
1. | Thu, Apr 1 |
Introduction to computer security; Saltzer and Schroeder |
§1, §13 |
2. | Tue, Apr 6 |
Saltzer and Schroeder; access control matrix model |
§13, §2 |
3. | Thu, Apr 8 |
HRU result, Take-Grant; SPM, expressive power |
§3 |
4.
|
Tue, Apr 13
|
Expressive power, TAM, policies
|
§3, §4
|
5.
|
Thu, Apr 15
|
Policies, Bell-LaPadula Model
|
§4, §4
|
6.
|
Tue, Apr 20
|
DG/UX system; formal Bell-LaPadula model
|
§5
|
7.
|
Thu, Apr 22
|
no class
|
|
8.
|
Tue, Apr 27
|
Formal Bell-LaPadula model, tranquility, System Z
|
§5
|
9.
|
Thu, Apr 29
|
guest lecturer: Prof. Felix Wu
|
|
10.
|
Tue, May 4
|
Integrity models; Chinese wall
|
§6, §7
|
11.
|
Thu, May. 6
|
CISS, ORCON, RBAC; basic cryptography
|
§7
|
12.
|
Tue, May. 11
|
Ciphers, DES, public key, cryptographic hashes
|
§9
|
13.
|
Thu, May 13
|
Key exchange, generation, infrastructure, escrow
|
§10
|
14.
|
Tue, May 18
|
Key escrow; digital signatures; authentication
|
§10, §12
|
15.
|
Thu, May 20
|
Authentication, access control mechanisms
|
§12, §15
|
16.
|
Tue, May 25
|
Access control mechanisms, assurance
|
§15, §18
|
17.
|
Thu, May 27
|
Life cycle and security; auditing, design of audit systems
|
§18, §24
|
18.
|
Tue, Jun 1
|
Audit mechanisms, examples; intrusion detection
|
§24
|
19.
|
Thu, Jun 3
|
Intrusion detection models, architectures, organization
|
§25
|
20.
|
Tue, Jun 8
|
no class
|
|
This syllabus is tentative and subject to change as needed. If there is a topic you want to hear about and it is in the syllabus, please let me know. I won't promise to cover it, but I may ....