! 

Sessions

Last updated November 22, 2005 9:42
Topic Slides Required Reading
(from the Bishop's text book, unless otherwise specified)
Optional Reading
(from the text book, unless otherwise specified)
Course Orientation printable, viewable none none
Introduction printable, viewable
  • Bishop's chapter 1
  • Anderson's chapter 1
Rudimentary Treatise on the Construction of Locks, by Tomlinson
Cryptography: Introduction printable, viewable
  • Anderson's 5.1-5.4
  • Bishop's 8.1 -- 8.2.2
Cryptography: Symmetric Key Cryptosystems printable, viewable
  • Anderson's 5.5-5.8
  • Bishop's 8.2.3, 8.2.4
Cryptography: Asymmetric Key Cryptosystems printable, viewable
  • Anderson's 5.5-5.8
  • Sections 8.3 -- 8.6
 
Key Management printable, viewable
  • Bishop's Chapter 9
Cryptography in Networks printable, viewable
  • Bishop's Sections 10.3--11.6
Case study: "Security Possibilities in Layer 2" by Allan Anton viewable
  • slides of the lecture
N/A
Authentication

printable,
viewable

  • Anderson's Chapters 3 and 13.
  • Bishop's Chapter 11
Access control mechanisms and policies
  • Anderson's book: 4.1, 4.2, 4.4, 4.5, 7.1-7.3, 7.6, 7.7, 8.1, 8.2, 8.5, 9.2.
  • Bishop's book: 14.1, 14.2, 4.1-4.4, 4.6, chapter 5, 6.2-6.4, 7.1, 7.3-7.5.
  • Anderson's book: 4.3, 7.4, 7.5, 8.3, 8.4, 9.1, 9.3-9.5.
  • Bishop's book: chapter 3, 7.2
  • B. Lampson. "Protection," Proc. 5th Princeton Conf. on Information Sciences and Systems, Princeton, 1971. Reprinted in ACM Operating Systems Rev. 8, 1 (Jan. 1974), pp. 18-24.
  • Sandhu, Ravi S. "Lattice-Based Access Control Models." In: IEEE Computer, 26(11), pp. 9-19, 1993.
Malicious Logic

printable

viewable

  • Bishop's Chapter 19
  • E. Spafford, "A Failure to Learn from the Past," in Proceedings of Annual Computer Security Applications Conference (ACSAC), Las Vegas, Nevada, 2003.
  • Anderson's book: Section 18.4
Availability

printable

viewable

  • none
Design Principles

printable
viewable

  • Bishop's Chapter 12
J. Saltzer and M. Schroeder "The Protection of Information in Computer Systems"
Developing Secure Software

printable

viewable

Accountability
self-study
  • Bishop's Chapter 21
 
Assurance
self-study
  • Bishop's Chapters 17, 18
Security & Usability

printable

viewable

  • D. Balfanz, D.K. Smetters, and R. E. Grinter, "In Search of Usable Security: Five Lessons From The Field," IEEE Security and Privacy, volume 2, number 5, pp.19-24, September/October 2004.
  • K. Yee, "User Interaction Design for Secure Systems"
Economics of Security    

 


Copyright © 2003-2005 Konstantin Beznosov