This course focuses on the theoretical foundations of methods used to protect data in computer and communication systems. Among the topics covered are the access control matrix and undecidability of security, various policy models, non-interference and non-deducibility, information flow. and the confinement problem.
Prerequisite: ECS 235A; ECS 120 and ECS 150 recommended.
|ECS 235B, Foundations of Computer and Information Security
Winter Quarter 2008