The following notes are an overview of the material covered in lecture.
Thanks to Prof. Schneider for his thoughtful comments and to Lynette Millett for
her comprehensive notes.
Date | Notes |
27 Jan |
The Trustworthiness and Prevalence of Today's
Networked Information Systems. |
1 Feb |
Fundamental Principles and Definitions. |
3 Feb |
Principle of Least Privilege, Building Secure Systems, Cryptography. |
8 Feb |
Primitive Cryptosystems. |
10 Feb |
Denial of Service Attacks. |
15 Feb |
Perfect Substitution Cipher and Secret Key Cryptography. |
17 Feb |
Kerberos. |
22 Feb |
Online and Proactive Secret Sharing. |
24 Feb |
Public Key Cryptography. |
29 Feb |
Digital Signatures and RSA. |
2 March |
Certification Authorities. |
7 March |
Multiple CAs and Reasoning about Statements. |
9 March |
Maintaining a Secret On-Line. |
14 March |
Human Authentication and Passwords. |
16 March |
Human Authentication Continued . |
28 March |
Authorization . |
30 March |
Limitations of Policy Analysis, Reference Monitors . |
4 April |
Implementing Complete Mediation with Hardware . |
6 April |
ACM Storage and Access Control Lists . |
11 April |
Capability Lists . |
13 April |
Domain Changes, Review, and Revocation . |
Website created and maintained by: Vicky Weissman ( vickyw@cs.cornell.edu )