|
Tuesday |
Thursday |
Week 1 (Jan 8 -- Jan 12) |
-
Overview of the course (PDF)
- Readings
|
-
UNIX Access Control (PDF)
- Readings
|
Week 2 (Jan 15 -- Jan 19) |
-
Access Control Enhancement to deal with malicious and buggy software (PDF)
|
-
Analysis of DAC Weaknesses (PDF)
|
Week 3 (Jan 22 -- Jan 26) |
-
The Bell LaPadula Model (PDF)
|
-
Integrity Protection (PDF)
|
Week 4 (Jan 29 -- Feb 2) |
-
Usable Integrity Protection (PDF)
|
-
Role Based Access Control (PDF)
|
Week 5 (Feb 5 -- Feb 9) |
-
User Authentication (PDF)
-
Slides for paper "An Empirical Study of Mnemonic Sentence-based Password Generation Strategies"
(PDF)
|
-
Database Access Control (PDF)
|
Week 6 (Feb 12 -- Feb 16) |
-
Virtual Private Databases (PDF)
|
-
Overview of Symmetric Cryptography (PDF)
|
Week 7 (Feb 19 -- Feb 23) |
-
Overview of Public-Key Cryptography (PDF)
|
-
Key Establishment Protocols (PDF)
|
Week 8 (Feb 26 -- Mar 2) |
|
|
Week 9 (Mar 5 -- Mar 9) |
|
|
Week 10 (Mar 12 -- Mar 16) |
|
|
Week 11 (Mar 19 -- Mar 23) |
|
|
Week 12 (Mar 26 -- Mar 30) |
|
|
Week 13 (Apr 2 -- Apr 6) |
|
- Lab description and continuation of last topic
|
Week 14 (Apr 9 -- Apr 13) |
|
|
Week 15 (Apr 16 -- Apr 20) |
|
|
Week 16 (Apr 23 -- Apr 27) |
|
|