Read our cookies policy and privacy statement for more information.
×Davis, California•
Theoretical foundations of methods used to protect data in computer and communication systems. Access control matrix and undecidability of security; policies; Bell-LaPadula, Biba, Chinese Wall models; non-interference and non-deducibility; information flow and the confinement problem.
Units: 4.0
Hours: Lecture—3 hour(s); Project (Term Project).