General Information


Matt Bishop; Email:
Office: 2209 Watershed Science; Phone: (530) 752-8060
Office Hours: Mon 4:10pm–5:00pm; Wed, Fri 3:10pm–4:00pm


MWF 2:10pm–3:00pm in 267 Olson

Course Outline

Theoretical foundations of methods used to protect data in computer and communication systems. Access control matrix and undecidability of security; policies; Bell-LaPadula, Biba, Chinese Wall models; non-interference and non-deducibility; information flow and the confinement problem.

Course Goals


ECS 235A, Computer and Information Security. ECS 150, Operating Systems, and ECS 120, Theory of Computation, are strongly recommended


M. Bishop, Computer Security: Art and Science, Addison-Wesley, Boston, MA (2003). ISBN 0-201-44099-7.

Class Web Site

To access the class web site, go to SmartSite ( and log in using your campus login and password. Then go to ECS 235B in your schedule. I will post Announcements, assignments, handouts, and grades there, and you must submit assignments there. The alternate web site,, has all the handouts, assignments, and announcements.

Extra Credit

Extra credit is kept separate from regular scores. It counts in your favor if you end up on a borderline between two grades at the end of the course. But, not doing extra credit will never be counted against you, because grades are assigned on the basis of regular scores. You should do extra credit if you find it interesting and think that it might teach you something. Remember, though, it is not wise to skimp on the regular assignment in order to do extra credit!


Homework is 50% of your grade, and the project is 50% of your grade. There is no final examination.

Academic Integrity

The UC Davis Code of Academic Conduct, available at, applies to this class. For this course, all submitted work must be your own. You may discuss your assignments with classmates or the instructor to get ideas or a critique of your ideas, but the ideas and words you submit must be your own. Unless explicitly stated otherwise, collaboration is considered cheating and will be dealt with accordingly.

You can also obtain a PDF version of this. Version of April 12, 2013 at 11:36AM