Tentative
Schedule for CompSci 725 FC 2001 |
|
|
|
Lec# |
Date |
Presenter |
Topic |
1 |
27-Feb-01 |
Thomborson |
Introductory comments; handouts
1,2,3,4; collect handout 2 |
2 |
28-Feb-01 |
Thomborson |
Pfleeger, Chapter 1 |
3 |
2-Mar-01 |
Thomborson |
Dept and Uni computer
regulations; Nichols, "… Software Patents"; handout 5,6,7 |
4 |
6-Mar-01 |
Thomborson |
Select articles for student oral
reports; (handout 8 was never distributed) |
5 |
7-Mar-01 |
Thomborson |
Select articles for student oral
reports |
6 |
9-Mar-01 |
Thomborson |
Select articles for student oral
reports; requirements for oral reports; handout 9 |
7 |
13-Mar-01 |
Thomborson |
Samuelson, "Encoding the
Law ..." |
8 |
14-Mar-01 |
Thomborson |
Pfleeger, Section 11.5; ethical
statements from IEEE, CPSR, RSNZ; Mann, "Who will own ... ?";
handout 10 |
9 |
16-Mar-01 |
Thomborson |
Rosner, "Steal this
Software"; Radatti, "... Moral Guidelines"; req'ts for term
reports; handouts 11,12 |
10 |
20-Mar-01 |
Thomborson |
Collberg & Thomborson,
"Watermarking, Tamperproofing, …" |
11 |
21-Mar-01 |
Thomborson |
Tamperproofing; Quotations,
plagiarism, summarizing and paraphrasing; excerpts due from (3)-(8) |
12 |
23-Mar-01 |
Thomborson |
Cryptography |
|
23-Mar-01 |
Z Wei (1) |
Chess, "… Mobile Code
Systems"; handouts 13,14 |
13 |
27-Mar-01 |
M Alford (3) |
Cox & Linnartz, "…
Tampering with Watermarks" |
|
27-Mar-01 |
Thomborson |
Steganography |
14 |
28-Mar-01 |
J Li (2) |
Bellare et al., "…
Electronic Payment System"; excerpts due from (9)-(12) |
|
28-Mar-01 |
W Yang (4) |
Aucsmith, "Tamper Resistant
Software…" |
15 |
30-Mar-01 |
Y Liu (5) |
Paxson, "… Network
Intruders …" |
|
30-Mar-01 |
M Painter (7) |
Lindquist & Jonsson, "…
COTS" |
16 |
3-Apr-01 |
H Hassan (8) |
Margrave, "GSM
Security…" |
|
3-Apr-01 |
Thomborson |
Selection of topic for your term
paper; Writing a title, synopsis and abstract |
17 |
4-Apr-01 |
Z Liu (9) |
Girard & Lanet, "… Open
Cards" |
|
4-Apr-01 |
Thomborson |
Choices of form for your term
paper |
18 |
6-Apr-01 |
G Rugg(10) |
Sebe, "Spatial-Domain Image
Watermarking" |
|
6-Apr-01 |
Thomborson |
Discussion of titles, synopses
and abstracts; Assignment 1 due |
19 |
24-Apr-01 |
Jay Garden |
Guest speaker from the GCSB;
draft titles & synopses due from all students |
20 |
25-Apr-01 |
(no lecture) |
ANZAC Day |
21 |
27-Apr-01 |
Thomborson |
Research skills -- discovering and citing relevant articles
for your term paper |
22 |
1-May-01 |
Thomborson |
Practice Final Exam (ungraded) |
23 |
2-May-01 |
X Deng (11) |
Hohl, "Time-Limited
Blackbox Security"; excerpts due from (14)-(17) |
|
2-May-01 |
Thomborson |
Discussion of student project
titles, synopses & abstracts |
24 |
4-May-01 |
W Zhang (12) |
Krsul & Spafford,
"Authorship Analysis" |
|
4-May-01 |
Y-C Shen (14) |
Ousterhout, "The Safe-Tcl
Security Model" |
25 |
8-May-01 |
B Ihle (15) |
Cohen, "Operating System
Protection …" |
|
8-May-01 |
Thomborson |
A step-by-step method for
writing a first draft of your term paper |
26 |
9-May-01 |
R Min (16) |
Garcia-Molina & Shivakumar, "Safeguarding and
Charging for Information …" |
|
9-May-01 |
M Li (17) |
Bates, "Fundamentals of
Computer Forensics" |
27 |
11-May-01 |
Y Li (18) |
Gong et al., "Signing,
Sealing and Guarding Java Objects" |
|
11-May-01 |
C Stanton (19) |
Law, "How to Make a Mint
..." |
28 |
15-May-01 |
M Zhang (20) |
Dowd, "Network Security:
It's Time to Take It Seriously" |
|
15-May-01 |
J Liu (21) |
Dean, Java Security ... |
29 |
16-May-01 |
A Cheeseman (22) |
Stephenson, Investigating Computer-Related Crime (pp. 98-111) |
|
16-May-01 |
J Tang (23) |
Ferguson et al., "Improved
Cryptanalysis of Rijndael" |
30 |
18-May-01 |
I Kurlatov (24) |
Gilmore, "Secure Remote
Access to an Internal Webserver" |
31 |
22-May-01 |
Thomborson |
A step-by-step method for
writing a final draft of your term paper |
|
22-May-01 |
Thomborson |
A step-by-step method for
writing a final draft of your term paper |
32 |
23-May-01 |
F Li (26) |
LaDue, "The Maginot
License…" |
|
23-May-01 |
T Lim (27) |
Ho, "A Study into the
Problem of Software Piracy" |
33 |
25-May-01 |
R Naidu (28) |
Devanbu & Stubblebine,
"Software Engineering for Security: A Roadmap" |
|
25-May-01 |
S Derhamy (29) |
Hunt, "Internet/Intranet
Firewall Security …" |
34 |
29-May-01 |
H Wu (30) |
Wallach et al., "Extensible
Security Mechanisms for Java" |
|
29-May-01 |
C West (31) |
Hedbom et al, "Analysis of
the Security of Windows NT" (?) |
35 |
30-May-01 |
Nevil Brownlee |
Expectations for Computer
Security Incident Response |
36 |
1-Jun-01 |
Thomborson |
Deadline for submission of your
term paper |
|
|
|
|