ECS 235B, Winter 2025: Foundations of Computer and Information Security
Announcements
none yet
Class Information
General Information
Syllabus
All About Homework
Term Project
Homework
Homework #1
(due Apr 14)
Homework #2 Revision 1
(due Apr 30)
(Note change of due date)
Homework #2
(due Apr 28)
Homework #3 Revision 2
(due May 16)
Homework #3
(due May 14)
Homework #4
(due Jun 4)
Extra Credit
Extra Credit #1
(due Jun 11)
Extra Credit #2
(due Jun 11)
Project
Project Selection
(due Apr 16)
Project Progress Report
(due May 7)
Completed Project
(due June 6, 3:00pm)
Handouts
Papers are on
Canvas
for copyright reasons
Example Homework Answer
Bell-LaPadula Symbols
Table of Notation for Noninterference and Nondeducibility
Lecture Outlines
Lecture # 1
(Mar 31)
Lecture # 2
(Apr 2)
Lecture # 3
(Apr 4)
Lecture # 4
(Apr 7)
Lecture # 5
(Apr 11)
Lecture # 6
(Apr 14)
Lecture # 7
(Apr 16)
Lecture # 8
(Apr 18)
Lecture # 9
(Apr 21)
Lecture #10
(Apr 23)
Lecture #11
(Apr 25)
Lecture #12
(Apr 28)
Lecture #13
(Apr 30)
Lecture #14
(May 2)
Lecture #15
(May 5)
Lecture #16
(May 7)
Lecture #17
(May 12)
Lecture #18
(May 14)
Lecture #19
(May 16)
Lecture #20
(May 28)
Lecture #21
(May 30)
Lecture #22
(June 2)
Lecture #23
(June 4)
Modules
Administrative Material
Basic Components
Reference Monitors
Access Control Matrix
Attribute-Based Access Control Matrix
HRU Result
Take-Grant Model Rules
Sharing in the Take-Grant Model
Stealing in the Take-Grant Model
Schematic Protection Model
Expressiveness
Typed Access Matrix Model
Security Policies
Security Policy Languages
Precise and Secure Policies
Lattices
Confidentiality Policies and the Bell-LaPadula Model
Bell-LaPadula Model
Applying the Bell-LaPadula Model
Tranquility
The Controversy and System Z
Integrity Requirements and the Biba Model
Clark-Wilson Model
Trust Models
Constraint-Based Availability Models
State-Based Availability Models
Network Flooding
Chinese Wall Model
Clinical Information Systems Security Policy
Originator-Based Access Control
Role-Based Access Control
Traducement
Break-the-Glass Policies
Policy Composition
Introduction to Noninterference
Security Policy and the Unwinding Theorem
Access Control Matrix Revisited
Generalized Noninterference
Policy Composition I
Nondeducibility
Restrictiveness
Side Channels
Introduction to Assurance
Building Systems with Assurance
Design Assurance Techniques
Implementation Assurance Techniques
Entropy
Introduction to Information Flow
Information Flow Policies
Confinement Problem
Isolation
Covert Channels
Detecting Covert Channels
Analyzing Covert Channels
Mitigating Covert Channels
Evaluating Systems