CS 590U

Access Control: Theory and Practice

Spring 2005

Syllabus

    

Back to course homepage

Reference Books:

Chapters of the following books are useful for the course.  The first one is available on the Web.  Required readings from the other books will be handed out in class.  The Amoroso book and the Anderson book have been placed under reservation in the Math&CS library. 

  • Morrie Gasser: (available online) Building A Secure Computer System.  Van Nostrand Reinhold Co., 1988.
  • Edward Amoroso:  Fundamentals of computer security technology.  Prentice Hall, 1994.
  • Ross Anderson: Security engineering : a guide to building dependable distributed systems.  Wiley, 2001.
  • E.A. Demillo et al., editors: Foundations of Secure Computation.  Academic Press, 1978.
  • Dieter Gollmann: Computer Security.  Wiley, 1999.

 

Date Topic Readings Before Each Lecture
Introduction
Tue Jan 11

 

Thu Jan 13
  • Overview of project topics
  • Slides
  • Anderson Book:
    • Sections 4.1 & 4.2 (Handout)
  • Gollmann Book:
    • Chapter 3: Access Control (Handout)

The Foundations

Tue Jan 18

(HW1 due)

  • State-Transition Systems
  • Access control matrices
  • The Graham-Denning DAC schemes
  • Slides
  • Gasser Book: Chapter 3
  • G.S. Graham & P.J. Denning: "Protection: Principles and Practice" AFIPS Spring Joint Computer Conference, 1972 (Handout)
Thu Jan 20

(Pre-proposal due)

Tue Jan 25

 

  • The Bell-Lapadula MAC model
  • Slides
Thu Jan 27

(HW2 due)

  • Safety analysis
  • The HRU scheme
  • Slides
Tue Feb 1

 

  • DeMillo book:
    • R.S. Fabry: "One Perspective on the Results about the Decidability of System Safety".   (Handout)
    • A.K. Jones: "Protection Mechanism Models: Their Usefulness"   (Handout)
Thu Feb 3

 

Tue Feb 8

(HW3 due)

  • Nondeducability
  • The confinement problem
  • Covert channels
  • Slides
Thu Feb 10

 

     

Role-Based Access Control (RBAC)

Tue Feb 15

 

  • RBAC96
  • NIST RBAC Standard
  • Slides

 

Thu Feb 17

(HW4 due)

  • Separation of Duty in RBAC
  • Slides
Tue Feb 22

 

  • Constraint Generation in RBAC
  • Administration in RBAC
  • Slides

Trust Management and Automated Trust Negotiation

Thu Feb 24
  • Basics of Logic & Logic Programming
  • Slides
  • U. Nilsson and J. Maluszynski: Logic, Programming and Prolog
Tue Mar 1

 

  • Overview of Trust Management
  • Slides
Thu Mar 3

(Proposal due)

Tue Mar 8

 

  • RT0 and Distributed Credential Chain Discovery
  • Slides
Thu Mar 10

(HW5 due)

 

Tue Mar 15 Spring Break  
Thu Mar 17 Spring Break  

 

Tue Mar 22
  • The RT family of Role-Based Trust Management Languages
  • Security Analysis in RBAC
  • Security Analysis in Trust Management
  • Slides
Thu Mar 24

 

  • Security Analysis in Trust Management (Continued)
  • No new slides
  • Assignment 6
  • No new readings
Tue Mar 29

 

Lecture given by Mahesh V. Tripunitara
  • Expressive power of access control schemes
  • Slides

 

Thu Mar 31

(HW6 due)

  • Automated Trust Negotiation
  • Slides
Tue Apr 5
Access Control in Databases
Thu Apr 7

 

Lecture given by Ji-Won Byun and Mahesh V. Tripunitara
Tue Apr 12

 

  • The Ingres approach
  • The Virtual Private Databases approach
  • Other query rewriting approaches
  • Slides
Misc Topics
Thu Apr 14
  • Firewalls
  • Review of the course
  • Slides
Project & Other Presentation
Tue Apr 19
  • Abhi
  • Jiangtao
  • Qihua
 
Thu Apr 21
  • Ian
  • Paul
  • Ryan
 
Tue Apr 26 Ji-Won Byun:
  • Purpose-Based Access Control in Databases

Yunhua Koglin

  • An update protocol for XML documents in Distributed and Cooperative Systems

 

Thu Apr 28
  • Ji-Won
  • Jing
  • Yu