Outline for May 2, 2000

  1. Greetings and felicitations!
    1. All homework #1 must be turned in by Thursday or it won't be accepted; you need to email it to me now as the directory is closed.
    2. Handouts now available on the web, thanks to Doreen; go to the restricted page at the bottom of the ECS253 home page, and you can get PDF versions of both the first handout and the second handout (which will be given out in paper form on Thursday)
    3. No class on Tuesday May 16. There may or may not be class on May 18; I'll let you know when I do.
  2. Public key
    1. Review X.509, PGP web of trust
    2. PEM hierarchy of certification
  3. Representation of identity
    1. Users
    2. Groups
    3. Roles
  4. Review of access control matrix
  5. Access control lists
    1. What they are
    2. Abbreviations
    3. Issues in creation and maintenance
    4. Revocation
  6. Capabilities
    1. What they are
    2. Copying and amplifying
    3. Revocation
    4. Limits
  7. Locks and keys
  8. Ring-based access control
    1. Processes accessing data segments
    2. Processes accessing procedure segments
  9. Propagated access control lists


Send email to bishop@cs.ucdavis.edu.

Department of Computer Science
University of California at Davis
Davis, CA 95616-8562



Page last modified on 5/11/2000