Security policies and protection mechanisms for a computing system, including such topics as design principles of protection systems, authentication and authorization, reference monitors, security architecture of popular platforms, formal modelling of protection systems, discretionary access control, safety analysis, information flow control, integrity, role-based access control. Legal and ethical considerations will be introduced as necessary.
This course may not be repeated for credit.
Antirequisite(s)
- Credit for Computer Science 625 and 525 will not be allowed.
Sections
| LEC 1 | MWF 14:00 - 14:50
| | Ryan Henry | | |
| Notes: Synchronous/Asynchronous schedule will be provided in the course outline via D2L |
This course will be offered next in
Fall 2021.