Table of Contents
- Introduction
- An Overview of Computer Security
- Foundations
- Access Control Matrix
- Foundational Results
- Policy
- Security Policies
- Confidentiality Policies
- Integrity Policies
- Hybrid Policies
- Noninterference and Policy Composition
- Implementation I: Cryptography
- Basic Cryptography
- Key Management
- Cipher Techniques
- Authentication
- Implementation II: Systems
- Design Principles
- Representing Identity
- Access Control Mechanisms
- Information Flow
- Confinement Problem
- Assurance (contributed by Elisabeth Sullivan)
- Introduction to Assurance
- Building Systems with Assurance
- Formal Methods
- Evaluating Systems
- Special Topics
- Malicious Logic
- Vulnerability Analysis
- Auditing
- Intrusion Detection
- Practicum
- Network Security
- System Security
- User Security
- Program Security
- End Matter
- Lattices
- The Extended Euclidean Algorithm
- Entropy and Uncertainty
- Virtual Machines
- Symbolic Logic
- Example Academic Security Policy
- Bibliography