# |
date |
topic |
reading1 |
1. |
Thu, Apr 1 |
Introduction to computer security |
§1, §13 |
2. |
Tue, Apr 6 |
Access control matrix, HRU result; Take-Grant |
§2, §3.1-3.3 |
3. |
Thu, Apr 8 |
Take-Grant; SPM, expressive power |
§3.3-3.4 |
4. |
Tue, Apr 13 |
Policies, Bell-LaPadula Model |
§4.1-4.4, 4.7; §5.1-5.3 |
5.
|
Thu, Apr 15
|
System Z; Integrity models
|
§5.4, §6
|
6.
|
Tue, Apr 20
|
Chinese Wall Model, CISS, ORCON, RBAC
|
§7
|
7.
|
Thu, Apr 22
|
Noninterference, Nondeducibility
|
§8.1-8.3
|
8.
|
Tue, Apr 27
|
More Noninterference, Nondeducibility
|
§8.4-8.5
|
9.
|
Thu, Apr 29
|
Cryptography: classical, public key, checksums
|
§9
|
10.
|
Tue, May 4
|
Key management
|
§10
|
11.
|
Thu, May. 6
|
Applying ciphers
|
§11
|
12.
|
Tue, May. 11
|
Authentication and identity
|
§12, §14
|
13.
|
Thu, May 13
|
Access control mechanisms
|
§15
|
14.
|
Tue, May 18
|
Information flow
|
§16
|
15.
|
Thu, May 20
|
Confinement, isolation, covert channels
|
§17
|
16.
|
Tue, May 25
|
Assurance in systems
|
§18, §19.1
|
17.
|
Thu, May 27
|
More assurance, evaluation of systems
|
§19.2-19.3, §21
|
18.
|
Tue, Jun 1
|
Formal Methods
|
§20
|
19.
|
Thu, Jun 3
|
Vulnerability analysis
|
§23
|
20.
|
Tue, Jun 8
|
Auditing
|
§24
|
This syllabus is tentative and subject to change as needed. If there
is a topic you want to hear about and it is in the syllabus, please
let me know. I won't promise to cover it, but I may ....