Lecture Outlines


The following notes are an overview of the material covered in lecture.
Thanks to Prof. Schneider for his thoughtful comments and to Lynette Millett for her comprehensive notes.


Date Notes
27 Jan The Trustworthiness and Prevalence of Today's Networked Information Systems.
1 Feb Fundamental Principles and Definitions.
3 Feb Principle of Least Privilege, Building Secure Systems, Cryptography.
8 Feb Primitive Cryptosystems.
10 Feb Denial of Service Attacks.
15 Feb Perfect Substitution Cipher and Secret Key Cryptography.
17 Feb Kerberos.
22 Feb Online and Proactive Secret Sharing.
24 Feb Public Key Cryptography.
29 Feb Digital Signatures and RSA.
2 March Certification Authorities.
7 March Multiple CAs and Reasoning about Statements.
9 March Maintaining a Secret On-Line.
14 March Human Authentication and Passwords.
16 March Human Authentication Continued .
28 March Authorization .
30 March Limitations of Policy Analysis, Reference Monitors .
4 April Implementing Complete Mediation with Hardware .
6 April ACM Storage and Access Control Lists .
11 April Capability Lists .
13 April Domain Changes, Review, and Revocation .

Website created and maintained by: Vicky Weissman ( vickyw@cs.cornell.edu )