Operating Systems and Web Security: Fall 2012: Difference between revisions
No edit summary |
|||
Line 8: | Line 8: | ||
<tr valign="top"> | <tr valign="top"> | ||
<th> | <th> | ||
<p align="left"> | <p align="left">Date</p> | ||
</th> | </th> | ||
<th> | <th> | ||
Line 22: | Line 22: | ||
<tr> | <tr> | ||
<td> | <td> | ||
<p> | <p>Sept. 6 | ||
</p> | </p> | ||
</td> | </td> | ||
Line 30: | Line 30: | ||
</td> | </td> | ||
<td> | <td> | ||
<p> | <p> | ||
</p> | </p> | ||
</td> | </td> | ||
<td> | <td> | ||
<p> | <p> | ||
</p> | </p> | ||
</td> | </td> | ||
Line 40: | Line 40: | ||
<tr> | <tr> | ||
<td> | <td> | ||
<p> | <p>Sept. 11 | ||
</p> | </p> | ||
</td> | </td> | ||
<td> | <td> | ||
<p> | <p>Fundamentals (Groups) | ||
</p> | </p> | ||
</td> | </td> | ||
<td> | <td> | ||
<p> | <p>Saltzer & Schroeder, [http://www.cs.virginia.edu/~evans/cs551/saltzer/ The Protection of Information in Computer Systems] (1975) | ||
</p> | </p> | ||
</td> | </td> | ||
<td> | <td> | ||
<p>[[ | <p>[[OSWebSec: Fundamentals|Fundamentals Notes]] | ||
</p> | </p> | ||
</td> | </td> | ||
Line 58: | Line 58: | ||
<tr> | <tr> | ||
<td> | <td> | ||
<p> | <p>Sept. 13 | ||
</p> | </p> | ||
</td> | </td> | ||
<td> | <td> | ||
<p> | <p>Criteria (Groups) | ||
</p> | </p> | ||
</td> | </td> | ||
<td> | <td> | ||
<p> | <p>[http://seclab.cs.ucdavis.edu/projects/history/CD-1/dod85.pdf The DoD Orange Book] (1985) | ||
</p> | </p> | ||
</td> | </td> | ||
<td> | <td> | ||
<p>[[ | <p>[[OSWebSec: Criteria|Criteria Notes]] | ||
</p> | </p> | ||
</td> | </td> | ||
Line 76: | Line 76: | ||
<tr> | <tr> | ||
<td> | <td> | ||
<p> | <p>Sept. 18 | ||
</p> | </p> | ||
</td> | </td> | ||
<td> | <td> | ||
<p> | <p>Fundamentals (Discussion) | ||
</p> | </p> | ||
</td> | </td> | ||
<td> | <td> | ||
<p> | <p> | ||
</p> | </p> | ||
</td> | </td> | ||
<td> | <td> | ||
<p> | <p> | ||
</p> | |||
</td> | |||
</tr> | |||
<tr> | |||
<td> | |||
<p>Sept. 20 | |||
</p> | |||
</td> | |||
<td> | |||
<p>Criteria (Discussion) | |||
</p> | |||
</td> | |||
<td> | |||
<p> | |||
</p> | |||
</td> | |||
<td> | |||
<p> | |||
</p> | </p> | ||
</td> | </td> |
Revision as of 05:58, 6 September 2012
Course Outline
The outline of the course can be found here.
Readings
Date |
Topics |
Readings |
Notes |
---|---|---|---|
Sept. 6 |
Introduction |
|
|
Sept. 11 |
Fundamentals (Groups) |
Saltzer & Schroeder, The Protection of Information in Computer Systems (1975) |
|
Sept. 13 |
Criteria (Groups) |
The DoD Orange Book (1985) |
|
Sept. 18 |
Fundamentals (Discussion) |
|
|
Sept. 20 |
Criteria (Discussion) |
|
|