These topics are tentative and subject to change without warning. In particular, if I don’t discuss something you’re interested in, ask about it! I may very well add it or modify what I’m covering to include it.
lec | date | topic | reading | due |
---|---|---|---|---|
1. | Jan 9 | Introduction, overview of security | §1 | |
2. | Jan 11 | Access control matrix model | §2; [Z+05] | |
3. | Jan 13 | Safety question and the HRU result | §3.1, 3.2 | |
Jan 16 | no class (Martin Luther King, Jr. Day) | |||
4. | Jan 18 | Take-Grant Protection Model | §3.3; [Bi96] | |
5. | Jan 20 | Schematic Protection Model | §3.4 | project selection, homework #1 |
6. | Jan 23 | Expressive power, ESPM, TAM, MTAM | §3.5 | |
7. | Jan 25 | Comparison of models | handout | |
8. | Jan 27 | Security policies, mechanisms | §4; [LT05] | |
9. | Jan 30 | Bell-LaPadula Policy Model | §5, 30; [Sa93] | |
10. | Feb 1 | Declassification, tranquility, System Z | handout; §5.3, 5.4 | |
11. | Feb 3 | Biba, Clark-Wilson Integrity Models | §6.2, 6.4 | homework #2 |
12. | Feb 6 | Trust models | handout | |
13. | Feb 8 | Availability policy models | handout | |
14. | Feb 10 | Chinese Wall, Other Hybrid Policy Models | §7.1, 7.2; [WB04] | |
15. | Feb 13 | ORCON, RBAC Access Control Models | §7.3, 7.4 | |
16. | Feb 15 | Deterministic Noninterference | §8.1, 8.2l [KR02] | progress report |
17. | Feb 17 | Nondeducibility, restrictiveness, composition | §8.3–8.5; [Ma02] | homework #3 |
Feb 20 | no class (Presidents’ Day) | |||
18. | Feb 22 | Identity | §14 | |
19. | Feb 24 | Information flow policies | §16.1, 16.2; [B+07] | |
20. | Feb 27 | Information flow | §16.3–16.5 | |
21. | Feb 29 | Confinement problem, isolation | §17.1, 17.2, 33 | |
22. | Mar 2 | Analyzing covert channels | §17.3; [S+06] | homework #4 |
23. | Mar 5 | The insider problem | [B+08, B+09] | |
24. | Mar 7 | Basic assurance | §18 | |
25. | Mar 9 | Assurance in requirements and design | §19.1, 19.2.1–19.2.2 | |
26. | Mar 12 | Assurance in design and implementation | §19.2.3–19.3 | |
27. | Mar 14 | Application: electronic voting systems | handout | |
28. | Mar 16 | To be arranged | homework #5 | |
29. | Mar 19 | To be arranged | completed project |
ECS 235B, Foundations of Computer and Information Security Winter Quarter 2012 |