Table of Contents

  1. Introduction
    1. An Overview of Computer Security
  2. Foundations
    1. Access Control Matrix
    2. Foundational Results
  3. Policy
    1. Security Policies
    2. Confidentiality Policies
    3. Integrity Policies
    4. Hybrid Policies
    5. Noninterference and Policy Composition
  4. Implementation I: Cryptography
    1. Basic Cryptography
    2. Key Management
    3. Cipher Techniques
    4. Authentication
  5. Implementation II: Systems
    1. Design Principles
    2. Representing Identity
    3. Access Control Mechanisms
    4. Information Flow
    5. Confinement Problem
  6. Assurance (contributed by Elisabeth Sullivan)
    1. Introduction to Assurance
    2. Building Systems with Assurance
    3. Formal Methods
    4. Evaluating Systems
  7. Special Topics
    1. Malicious Logic
    2. Vulnerability Analysis
    3. Auditing
    4. Intrusion Detection
  8. Practicum
    1. Network Security
    2. System Security
    3. User Security
    4. Program Security
  9. End Matter
    1. Lattices
    2. The Extended Euclidean Algorithm
    3. Entropy and Uncertainty
    4. Virtual Machines
    5. Symbolic Logic
    6. Example Academic Security Policy
    7. Bibliography