These topics are tentative and subject to change without warning. In particular, if I don’t discuss something you’re interested in, ask about it! I may very well add it or modify what I’m covering to include it.
| lec | date | topic | reading | due |
|---|---|---|---|---|
| 1. | Jan 9 | Introduction, overview of security | §1 | |
| 2. | Jan 11 | Access control matrix model | §2; [Z+05] | |
| 3. | Jan 13 | Safety question and the HRU result | §3.1, 3.2 | |
| Jan 16 | no class (Martin Luther King, Jr. Day) | |||
| 4. | Jan 18 | Take-Grant Protection Model | §3.3; [Bi96] | |
| 5. | Jan 20 | Schematic Protection Model | §3.4 | project selection, homework #1 |
| 6. | Jan 23 | Expressive power, ESPM, TAM, MTAM | §3.5 | |
| 7. | Jan 25 | Comparison of models | handout | |
| 8. | Jan 27 | Security policies, mechanisms | §4; [LT05] | |
| 9. | Jan 30 | Bell-LaPadula Policy Model | §5, 30; [Sa93] | |
| 10. | Feb 1 | Declassification, tranquility, System Z | handout; §5.3, 5.4 | |
| 11. | Feb 3 | Biba, Clark-Wilson Integrity Models | §6.2, 6.4 | homework #2 |
| 12. | Feb 6 | Trust models | handout | |
| 13. | Feb 8 | Availability policy models | handout | |
| 14. | Feb 10 | Chinese Wall, Other Hybrid Policy Models | §7.1, 7.2; [WB04] | |
| 15. | Feb 13 | ORCON, RBAC Access Control Models | §7.3, 7.4 | |
| 16. | Feb 15 | Deterministic Noninterference | §8.1, 8.2l [KR02] | progress report |
| 17. | Feb 17 | Nondeducibility, restrictiveness, composition | §8.3–8.5; [Ma02] | homework #3 |
| Feb 20 | no class (Presidents’ Day) | |||
| 18. | Feb 22 | Identity | §14 | |
| 19. | Feb 24 | Information flow policies | §16.1, 16.2; [B+07] | |
| 20. | Feb 27 | Information flow | §16.3–16.5 | |
| 21. | Feb 29 | Confinement problem, isolation | §17.1, 17.2, 33 | |
| 22. | Mar 2 | Analyzing covert channels | §17.3; [S+06] | homework #4 |
| 23. | Mar 5 | The insider problem | [B+08, B+09] | |
| 24. | Mar 7 | Basic assurance | §18 | |
| 25. | Mar 9 | Assurance in requirements and design | §19.1, 19.2.1–19.2.2 | |
| 26. | Mar 12 | Assurance in design and implementation | §19.2.3–19.3 | |
| 27. | Mar 14 | Application: electronic voting systems | handout | |
| 28. | Mar 16 | To be arranged | homework #5 | |
| 29. | Mar 19 | To be arranged | completed project |
|
ECS 235B, Foundations of Computer and Information Security Winter Quarter 2012 |