| # | date | topic | reading1 and notes | 
|---|---|---|---|
| 1. | Tue, Apr 1 | Introduction to computer security | §1, §13 | 
| 2. | Thu, Apr 3 | Access control matrix, HRU result; Take-Grant | §2, §3.1-3.3 | 
| 3. | Tue, Apr 8 | Take-Grant; SPM, expressive power | §3.3-3.4 | 
| 4. | Thu, Apr 10 | Policies, Bell-LaPadula Model | §4.1-4.4, 4.7; §5.1-5.3 | 
| 5. | Tue, Apr 15 | System Z; Integrity models | §5.4, §6 | 
| 6. | Thu, Apr 17 | Chinese Wall Model, CISS, ORCON, RBAC | §7 | 
| 7. | Tue, Apr 22 | Noninterference, Nondeducibility | §8.1-8.3 | 
| 8. | Thu, Apr 24 | More Noninterference, Nondeducibility | §8.4-8.5 | 
| 9. | Tue, Apr 29 | Cryptography: classical, public key, checksums | §9 | 
| 10. | Thu, May 1 | Key management | §10 | 
| 11. | Tue, May. 6 | Applying ciphers | §11 | 
| 12. | Thu, May. 8 | Authentication and identity | §12, §14 | 
| 13. | Tue, May 13 | Access control mechanisms | §15 | 
| 14. | Thu, May 15 | Information flow | §16 | 
| 15. | Tue, May 20 | Confinement, isolation, covert channels | §17 | 
| 16. | Thu, May 23 | Assurance in systems | §18, §19.1 | 
| 17. | Tue, May 27 | More assurance, evaluation of systems | §19.2-19.3, §21 | 
| 18. | Thu, May 29 | Formal Methods | §20 | 
| 19. | Tue, June 3 | Vulnerability analysis | §23 | 
| 20. | Thu, June 5 | Auditing | §24 | 
This syllabus is tentative and subject to change as needed. If there is a topic you want to hear about and it is in the syllabus, please let me know. I won't promise to cover it, but I may ....