COMP 4442 -- Advanced Computer Security
COMP 4442 -- Advanced Computer Security - Session 2 2010
Lecturer
Prof. Ron van der Meyden
email: last word of my name, at cse.unsw.edu.au
phone: +61 2 8306 0480
fax: +61 2 8306 0405
Prerequisites
This is an advanced course in computer security. We
assume that you have
- facility with discrete mathematics (MATH1081 or COMP9020) and
- prior exposure to computer security and cryptography (COMP3441 or MATH3411 or TELE3119)
If you do not have these prerequisites, your should take the
prerequisites first. If you have taken a course elsewhere that you consider
equivalent, consult the lecturer.
Textbook and References
There is no set text, the course will be based on selected readings
from the research literature. However, the following are suitable references
that will be helpful with parts of the material:
- Matt Bishop, Computer Security, Art and Science, Addison-Wesley, 2003
- Bruce Schneier, Applied Cryptography, 2nd Ed., Wiley, 1996
- Joachim Biskup, Security in Computing Systems, Springer, 2009.
Assessment
Assessment in this course will be structured as follows:
- Assignment 1 - 20 %
- Assignment 2 - 20 %
- Final Exam - 60 %
Topics
- Revision of Cryptography
- Digital Signatures and Public Key Infrastructure
- Authentication protocols, SSL, Kerberos
- Reasoning about Trust and Security protocols: Ban Logic
- Model Checking Security Protocols
- Advanced protocols: e.g. Electronic Payment Protocols
- Formal Models of Access Control
- Information Flow Security
- Type theory for Information Flow Security
- Programming Languages aspects of security
- Formal Security Architecture, Connecting Access Control to Information Flow
- Other topics depending on class interests may be covered.
Course Material for this edition
Lecture Notes, Reading and Exercises (CSE login required)