Outline for May 31, 2005
-
Access Control Mechanisms
-
Access control lists
-
Capabilities
-
Locks and Keys
-
Type checking
-
Ring-based access control
-
PACLs
-
IDS Models
-
Anomaly detection
-
Misuse modeling
-
Specification modeling
-
Architecture
-
Agent
-
Director
-
Notifier
-
Organization of IDS
-
Monitoring network traffic
-
Combining host and network monitoring
-
Autonomous agents
Here is a PDF version of this document.