Planned Syllabus

#date topic reading1
1.Thu, Apr 1 Introduction to computer security; Saltzer and Schroeder §1, §13
2.Tue, Apr 6 Saltzer and Schroeder; access control matrix model §13, §2
3.Thu, Apr 8 HRU result, Take-Grant; SPM, expressive power §3
4. Tue, Apr 13 Expressive power, TAM, policies §3, §4
5. Thu, Apr 15 Policies, Bell-LaPadula Model §4, §4
6. Tue, Apr 20 DG/UX system; formal Bell-LaPadula model §5
7. Thu, Apr 22 no class  
8. Tue, Apr 27 Formal Bell-LaPadula model, tranquility, System Z §5
9. Thu, Apr 29 guest lecturer: Prof. Felix Wu  
10. Tue, May 4 Integrity models; Chinese wall §6, §7
11. Thu, May. 6 CISS, ORCON, RBAC; basic cryptography §7
12. Tue, May. 11 Ciphers, DES, public key, cryptographic hashes §9
13. Thu, May 13 Key exchange, generation, infrastructure, escrow §10
14. Tue, May 18 Key escrow; digital signatures; authentication §10, §12
15. Thu, May 20 Authentication, access control mechanisms §12, §15
16. Tue, May 25 Access control mechanisms, assurance §15, §18
17. Thu, May 27 Life cycle and security; auditing, design of audit systems §18, §24
18. Tue, Jun 1 Audit mechanisms, examples; intrusion detection §24
19. Thu, Jun 3 Intrusion detection models, architectures, organization §25
20. Tue, Jun 8 no class  
This syllabus is tentative and subject to change as needed. If there is a topic you want to hear about and it is in the syllabus, please let me know. I won't promise to cover it, but I may ....
1. Unless otherwise noted, all readings are from the text.

Here is a PDF version of this document.