ECS 235B, Winter 2025: Foundations of Computer and Information Security
Announcements
none yet
Class Information
General Information
Syllabus
All About Homework
Term Project
Homework
Homework #1
(due Apr 14)
Homework #2 Revision 1
(due Apr 30)
(Note change of due date)
Homework #2
(due Apr 28)
Homework #3 Revision 2
(due May 16)
Homework #3
(due May 14)
Project
Project Selection
(due Apr 16)
Project Progress Report
(due May 7)
Completed Project
(due June 6, 3:00pm)
Handouts
Papers are on
Canvas
for copyright reasons
Example Homework Answer
Bell-LaPadula Symbols
Table of Notation for Noninterference and Nondeducibility
Lecture Outlines
Lecture # 1
(Mar 31)
Lecture # 2
(Apr 2)
Lecture # 3
(Apr 4)
Lecture # 4
(Apr 7)
Lecture # 5
(Apr 11)
Lecture # 6
(Apr 14)
Lecture # 7
(Apr 16)
Lecture # 8
(Apr 18)
Lecture # 9
(Apr 21)
Lecture #10
(Apr 23)
Lecture #11
(Apr 25)
Lecture #12
(Apr 28)
Lecture #13
(Apr 30)
Lecture #14
(May 2)
Lecture #15
(May 5)
Lecture #16
(May 7)
Lecture #17
(May 12)
Lecture #18
(May 14)
Modules
Administrative Material
Basic Components
Reference Monitors
Access Control Matrix
Attribute-Based Access Control Matrix
HRU Result
Take-Grant Model Rules
Sharing in the Take-Grant Model
Stealing in the Take-Grant Model
Schematic Protection Model
Expressiveness
Typed Access Matrix Model
Security Policies
Security Policy Languages
Precise and Secure Policies
Lattices
Confidentiality Policies and the Bell-LaPadula Model
Bell-LaPadula Model
Applying the Bell-LaPadula Model
Tranquility
The Controversy and System Z
Integrity Requirements and the Biba Model
Clark-Wilson Model
Trust Models
Constraint-Based Availability Models
State-Based Availability Models
Network Flooding
Chinese Wall Model
Clinical Information Systems Security Policy
Originator-Based Access Control
Role-Based Access Control
Traducement
Break-the-Glass Policies
Policy Composition
Introduction to Noninterference
Security Policy and the Unwinding Theorem
Access Control Matrix Revisited
Generalized Noninterference
Policy Composition I
Nondeducibility
Restrictiveness
Side Channels
Entropy
Introduction to Information Flow
Information Flow Policies
Confinement Problem
Isolation