|  | Tuesday | Thursday | 
  
    | Week 1 (Jan 8 -- Jan 12) | 
		
		    Overview of the course (PDF)
		Readings
			
		 | 
		
			UNIX Access Control (PDF)
		Readings
			
		 | 
  
    | Week 2 (Jan 15 -- Jan 19) | 
		
			Access Control Enhancement to deal with malicious and buggy software  (PDF)
		 | 
		
			Analysis of DAC Weaknesses  (PDF)
		 | 
  
    | Week 3 (Jan 22 -- Jan 26) | 
		
			The Bell LaPadula Model  (PDF)
		 | 
		
			Integrity Protection  (PDF)
		 | 
  
    | Week 4 (Jan 29 -- Feb 2) | 
		
			Usable Integrity Protection  (PDF)
		 | 
		
			Role Based Access Control (PDF)
		 | 
  
    | Week 5 (Feb 5 -- Feb 9) | 
		
			User Authentication (PDF)
		 
			Slides for paper "An Empirical Study of Mnemonic Sentence-based Password Generation Strategies"
			(PDF)
		 | 
		
			Database Access Control (PDF)
		 | 
  
  
    | Week 6 (Feb 12 -- Feb 16) | 
		
			Virtual Private Databases (PDF)
		 | 
		
			Overview of Symmetric Cryptography (PDF)
		 | 
  
    | Week 7 (Feb 19 -- Feb 23) | 
		
			Overview of Public-Key Cryptography (PDF)
		 | 
		
			Key Establishment Protocols (PDF)
			
		 | 
  
    | Week 8 (Feb 26 -- Mar 2) |  |  | 
  
    | Week 9 (Mar 5 -- Mar 9) |  |  | 
  
    | Week 10 (Mar 12 -- Mar 16) |  |  | 
  
    | Week 11 (Mar 19 -- Mar 23) |  |  | 
    
    | Week 12 (Mar 26 -- Mar 30) |  |  | 
  
    | Week 13 (Apr  2 -- Apr 6) |  | 
			Lab description and continuation of last topic | 
  
    | Week 14 (Apr 9 -- Apr 13) |  |  | 
  
    | Week 15 (Apr 16 -- Apr 20) |  |  | 
  
    | Week 16 (Apr 23 -- Apr 27) |  |  |