| # | 
    date | 
    topic | 
    reading1 | 
| 1. | 
    Thu, Apr 1 | 
    Introduction to computer security | 
    §1, §13 | 
| 2. | 
    Tue, Apr 6 | 
    Access control matrix, HRU result; Take-Grant | 
    §2, §3.1-3.3 | 
| 3. | 
    Thu, Apr 8 | 
    Take-Grant; SPM, expressive power | 
    §3.3-3.4 | 
| 4. | 
    Tue, Apr 13 | 
    Policies, Bell-LaPadula Model | 
    §4.1-4.4, 4.7; §5.1-5.3 | 
| 
5.
 | 
Thu, Apr 15
 | 
System Z; Integrity models
 | 
§5.4, §6
 | 
| 
6.
 | 
Tue, Apr 20
 | 
Chinese Wall Model, CISS, ORCON, RBAC
 | 
§7
 | 
| 
7.
 | 
Thu, Apr 22
 | 
Noninterference, Nondeducibility
 | 
§8.1-8.3
 | 
| 
8.
 | 
Tue, Apr 27
 | 
More Noninterference, Nondeducibility
 | 
§8.4-8.5
 | 
| 
9.
 | 
Thu, Apr 29
 | 
Cryptography: classical, public key, checksums
 | 
§9
 | 
| 
10.
 | 
Tue, May 4
 | 
Key management
 | 
§10
 | 
| 
11.
 | 
Thu, May. 6
 | 
Applying ciphers
 | 
§11
 | 
| 
12.
 | 
Tue, May. 11
 | 
Authentication and identity
 | 
§12, §14
 | 
| 
13.
 | 
Thu, May 13
 | 
Access control mechanisms
 | 
§15
 | 
| 
14.
 | 
Tue, May 18
 | 
Information flow
 | 
§16
 | 
| 
15.
 | 
Thu, May 20
 | 
Confinement, isolation, covert channels
 | 
§17
 | 
| 
16.
 | 
Tue, May 25
 | 
Assurance in systems
 | 
§18, §19.1
 | 
| 
17.
 | 
Thu, May 27
 | 
More assurance, evaluation of systems
 | 
§19.2-19.3, §21
 | 
| 
18.
 | 
Tue, Jun 1
 | 
Formal Methods
 | 
§20
 | 
| 
19.
 | 
Thu, Jun 3
 | 
Vulnerability analysis
 | 
§23
 | 
| 
20.
 | 
Tue, Jun 8
 | 
Auditing
 | 
§24
 | 
This syllabus is tentative and subject to change as needed. If there
is a topic you want to hear about and it is in the syllabus, please
let me know. I won't promise to cover it, but I may ....