The following notes are an overview of the material covered in lecture.
Thanks to Prof. Schneider for his thoughtful comments and to Lynette Millett for
her comprehensive notes.
| Date | Notes |
| 27 Jan |
The Trustworthiness and Prevalence of Today's
Networked Information Systems. |
| 1 Feb |
Fundamental Principles and Definitions. |
| 3 Feb |
Principle of Least Privilege, Building Secure Systems, Cryptography. |
| 8 Feb |
Primitive Cryptosystems. |
| 10 Feb |
Denial of Service Attacks. |
| 15 Feb |
Perfect Substitution Cipher and Secret Key Cryptography. |
| 17 Feb |
Kerberos. |
| 22 Feb |
Online and Proactive Secret Sharing. |
| 24 Feb |
Public Key Cryptography. |
| 29 Feb |
Digital Signatures and RSA. |
| 2 March |
Certification Authorities. |
| 7 March |
Multiple CAs and Reasoning about Statements. |
| 9 March |
Maintaining a Secret On-Line. |
| 14 March |
Human Authentication and Passwords. |
| 16 March |
Human Authentication Continued . |
| 28 March |
Authorization . |
| 30 March |
Limitations of Policy Analysis, Reference Monitors . |
| 4 April |
Implementing Complete Mediation with Hardware . |
| 6 April |
ACM Storage and Access Control Lists . |
| 11 April |
Capability Lists . |
| 13 April |
Domain Changes, Review, and Revocation . |
Website created and maintained by: Vicky Weissman ( vickyw@cs.cornell.edu )