ECS 235B, Winter 2022: Foundations of Computer and Information Security

Announcements

Class Information

Homework

Project

Handouts

Lecture Outlines

  1. Lecture #  1 (Jan 10)
  2. Lecture #  2 (Jan 12)
  3. Lecture #  3 (Jan 17)
  4. Lecture #  4 (Jan 19)
  5. Lecture #  5 (Jan 24)
  6. Lecture #  6 (Jan 26)
  7. Lecture #  7 (Jan 31)
  8. Lecture #  8 (Feb   2)
  9. Lecture #  9 (Feb   7)

Modules

Audio versions are PowerPoint with recordings, and are large

  1. Administrative Material (audio version)
  2. Basic Components (audio version)
  3. Reference Monitors (audio version)
  4. Access Control Matrix (audio version)
  5. Attribute-Based Access Control Matrix (audio version)
  6. HRU Result (audio version)
  7. Take-Grant Model Rules (audio version)
  8. Sharing in the Take-Grant Model (audio version)
  9. Stealing in the Take-Grant Model (audio version)
  10. Schematic Protection Model (audio version)
  11. Expressiveness (audio version)
  12. Typed Access Matrix Model (audio version)
  13. Security Policies (audio version)
  14. Security Policy Languages (audio version)
  15. Precise and Secure Policies (audio version)
  16. Lattices (audio version)
  17. Confidentiality Policies and the Bell-LaPadula Model (audio version)
  18. Bell-LaPadula Model (audio version)
  19. Applying the Bell-LaPadula Model (audio version)
  20. Tranquility (audio version)
  21. The Controversy and System Z (audio version)
  22. Integrity Requirements and the Biba Model (audio version)
  23. Clark-Wilson Model (audio version)
  24. Trust Models (audio version)
  25. Constraint-Based Availability Models (audio version)
  26. State-Based Availability Models (audio version)
  27. Network Flooding (audio version)
  28. Chinese Wall Model (audio version)
  29. Clinical Information Systems Security Policy (audio version)
  30. Originator-Control Access Control (audio version)
  31. Role-Based Access Control
  32. Traducement
  33. Break-the-Glass Policies
  34. Policy Composition
  35. Introduction to Noninterference