ECS 235B, Winter 2024: Foundations of Computer and Information Security
Announcements
Jan 16, 3:02pm:
Cancel Office Hour for Wednesday, January 17
Jan 10, 11:50am:
Class on Internet Measurement & Policy
Class Information
General Information
Syllabus
All About Homework
Term Project
Homework
Homework #1
(due Jan 19)
Homework #2
(due Feb 2)
Homework #3
(due Feb 21)
Homework #4
(due Mar 5)
Homework #5
Revision 1
(due Mar 15)
Original Homework 5
Extra Credit
Extra Credit #A
Revision 1
(due Jan 19)
Original Extra Credit A
Extra Credit #B
(due Jan 30)
Extra Credit #C
(due Feb 14)
Extra Credit #D
(due Feb 23)
Extra Credit #E
(due Mar 4)
Extra Credit #F
(due Mar 15)
Project
Project Selection
(due Jan 26)
Project Progress Report
(due Feb 16)
Completed Project
(due Mar 21)
Handouts
Papers are on
Canvas
for copyright reasons
Example Homework Answer
Bell-LaPadula Symbols
Table of Notation for Noninterference and Nondeducibility
Lecture Outlines
Lecture # 1
(Jan 8)
Lecture # 2
(Jan 10)
Lecture # 3
(Jan 12)
Lecture # 4
(Jan 17)
Lecture # 5
(Jan 19)
Lecture # 6
(Jan 22)
Lecture # 7
(Jan 24)
Lecture # 8
(Jan 26)
Lecture # 9
(Jan 29)
Lecture #10
(Jan 31)
Lecture #11
(Feb 9)
Lecture #12
(Feb 12)
Lecture #13
(Feb 14)
Lecture #14
(Feb 16)
Lecture #15
(Feb 21)
Lecture #16
(Feb 23)
Lecture #17
(Feb 26)
Lecture #18
(Feb 28)
Lecture #19
(Mar 1)
Lecture #20
(Mar 4)
Lecture #21
(Mar 6)
Lecture #22
(Mar 8)
Modules
Administrative Material
Basic Components
Reference Monitors
Access Control Matrix
Attribute-Based Access Control Matrix
HRU Result
Take-Grant Model Rules
Sharing in the Take-Grant Model
Stealing in the Take-Grant Model
Schematic Protection Model
Expressiveness
Typed Access Matrix Model
Security Policies
Security Policy Languages
Precise and Secure Policies
Lattices
Confidentiality Policies and the Bell-LaPadula Model
Bell-LaPadula Model
Applying the Bell-LaPadula Model
Tranquility
The Controversy and System Z
Integrity Requirements and the Biba Model
Clark-Wilson Model
Trust Models
Constraint-Based Availability Models
State-Based Availability Models
Network Flooding
Chinese Wall Model
Clinical Information Systems Security Policy
Originator-Based Access Control
Role-Based Access Control
Traducement
Break-the-Glass Policies
Policy Composition
Introduction to Noninterference
Security Policy and the Unwinding Theorem
Access Control Matrix Revisited
Generalized Noninterference
Policy Composition I
Nondeducibility
Restrictiveness
Side Channels
Introduction to Assurance
Building Systems with Assurance
Design Assurance Techniques
Implementation Assurance Techniques
Entropy
Introduction to Information Flow
Information Flow Policies
Confinement Problem
Isolation
Covert Channels
Detexcting Covert Channels