Planned Syllabus

# date topic reading1
1. Thu, Apr 1 Introduction to computer security §1, §13
2. Tue, Apr 6 Access control matrix, HRU result; Take-Grant §2, §3.1-3.3
3. Thu, Apr 8 Take-Grant; SPM, expressive power §3.3-3.4
4. Tue, Apr 13 Policies, Bell-LaPadula Model §4.1-4.4, 4.7; §5.1-5.3
5. Thu, Apr 15 System Z; Integrity models §5.4, §6
6. Tue, Apr 20 Chinese Wall Model, CISS, ORCON, RBAC §7
7. Thu, Apr 22 Noninterference, Nondeducibility §8.1-8.3
8. Tue, Apr 27 More Noninterference, Nondeducibility §8.4-8.5
9. Thu, Apr 29 Cryptography: classical, public key, checksums §9
10. Tue, May 4 Key management §10
11. Thu, May. 6 Applying ciphers §11
12. Tue, May. 11 Authentication and identity §12, §14
13. Thu, May 13 Access control mechanisms §15
14. Tue, May 18 Information flow §16
15. Thu, May 20 Confinement, isolation, covert channels §17
16. Tue, May 25 Assurance in systems §18, §19.1
17. Thu, May 27 More assurance, evaluation of systems §19.2-19.3, §21
18. Tue, Jun 1 Formal Methods §20
19. Thu, Jun 3 Vulnerability analysis §23
20. Tue, Jun 8 Auditing §24
This syllabus is tentative and subject to change as needed. If there is a topic you want to hear about and it is in the syllabus, please let me know. I won't promise to cover it, but I may ....

Footnotes

1. Unless otherwise noted, all readings are from the text.

Here is a PDF version of this document.