Table of Contents

  1. An Overview of Computer Security
  2. Access Control Matrix
  3. Foundational Results
  4. Security Policies
  5. Confidentiality Policies
  6. Integrity Policies
  7. Hybrid Policies
  8. Basic Cryptography
  9. Key Management
  10. Cipher Techniques
  11. Authentication
  12. Design Principles
  13. Representing Identity
  14. Access Control Mechanisms
  15. Information Flow
  16. Confinement Problem
  17. Introduction to Assurance (contributed by Elisabeth Sullivan)
  18. Evaluating Systems (contributed by Elisabeth Sullivan)
  19. Malicious Logic
  20. Vulnerability Analysis
  21. Auditing
  22. Intrusion Detection
  23. Network Security
  24. System Security
  25. User Security
  26. Program Security
  27. Lattices
  28. The Extended Euclidean Algorithm
  29. Virtual Machines
  30. Bibliography