Outline for May 26, 2006

Reading: text, §22.3—22.6, 18.1—18.2.1

  1. Greetings and felicitations!
  2. Types of malicious logic
    1. Computer viruses
  3. Computer virus theory and undecidability
  4. Assurance and Trust
    1. Why assurance?
    2. Role of requirements
    3. Assurance throughout life cycle
  5. Building secure and trusted systems
    1. Life cycle

Version of May 26, 2006 at 12:20 PM

You can also obtain a PDF version of this.