| # | date | 
    topic | 
    reading1 | 
| 1. | Thu, Apr 1 | 
    Introduction to computer security; Saltzer and Schroeder | 
    §1, §13 | 
| 2. | Tue, Apr 6 | 
    Saltzer and Schroeder; access control matrix model | 
    §13, §2 | 
| 3. | Thu, Apr 8 | 
    HRU result, Take-Grant; SPM, expressive power | 
    §3 | 
| 
4.
 | 
Tue, Apr 13
 | 
Expressive power, TAM, policies
 | 
§3, §4
 | 
| 
5.
 | 
Thu, Apr 15
 | 
Policies, Bell-LaPadula Model
 | 
§4, §4
 | 
| 
6.
 | 
Tue, Apr 20
 | 
DG/UX system; formal Bell-LaPadula model
 | 
§5
 | 
| 
7.
 | 
Thu, Apr 22
 | 
no class
 | 
 
 | 
| 
8.
 | 
Tue, Apr 27
 | 
Formal Bell-LaPadula model, tranquility, System Z
 | 
§5
 | 
| 
9.
 | 
Thu, Apr 29
 | 
guest lecturer: Prof. Felix Wu
 | 
 
 | 
| 
10.
 | 
Tue, May 4
 | 
Integrity models; Chinese wall
 | 
§6, §7
 | 
| 
11.
 | 
Thu, May. 6
 | 
CISS, ORCON, RBAC; basic cryptography
 | 
§7
 | 
| 
12.
 | 
Tue, May. 11
 | 
Ciphers, DES, public key, cryptographic hashes
 | 
§9
 | 
| 
13.
 | 
Thu, May 13
 | 
Key exchange, generation, infrastructure, escrow
 | 
§10
 | 
| 
14.
 | 
Tue, May 18
 | 
Key escrow; digital signatures; authentication
 | 
§10, §12
 | 
| 
15.
 | 
Thu, May 20
 | 
Authentication, access control mechanisms
 | 
§12, §15
 | 
| 
16.
 | 
Tue, May 25
 | 
Access control mechanisms, assurance
 | 
§15, §18
 | 
| 
17.
 | 
Thu, May 27
 | 
Life cycle and security; auditing, design of audit systems
 | 
§18, §24
 | 
| 
18.
 | 
Tue, Jun 1
 | 
Audit mechanisms, examples; intrusion detection
 | 
§24
 | 
| 
19.
 | 
Thu, Jun 3
 | 
Intrusion detection models, architectures, organization
 | 
§25
 | 
| 
20.
 | 
Tue, Jun 8
 | 
no class
 | 
 
 | 
This syllabus is tentative and subject to change as needed. If there is a topic you want to hear about and it is in the syllabus, please let me know. I won't promise to cover it, but I may ....