University home »
Faculty of Science »
Department of Computer Science »
Courses » COMPSCI 725 S2 C » Archive » 2006 » Lectures »
Computer Science
Lectures
This page was updated on 20 October 06.Announcements
- Princeton's Center for Information Technology Policy has released a white paper dated 13 September 2006 and a video describing their "Security Analysis of the Diebold AccuVote-TS Voting Machine".
- Infoworld article referencing a technical report entitled "Nedap/Groenendaal ES3B voting computer: a security analysis", dated 5th October 2006, and authored by Rop Gonggrijp, Willem Hengeveld et al. of the English language website of the "We don't trust voting computers" coalition.
- Handling absence or illness:
- If you must leave for family emergencies etc, PLEASE talk to the lecturer, or somehow get a message to the department. Very few problems are so urgent that we cannot be told quite quickly.
- For problems affecting assignments or tests, see the lecturer (or send email, or call on the telephone). This must be done as soon as reasonably possible, if we are to make alternative arrangements that will prevent you from getting a poor mark on this test or assignment.
- For illness during exams (or other problems that affect exam performance) students MUST contact the Examinations Office within ONE WEEK of the last affected examination to apply for an aegrotat pass (for illness) or compassionate pass (other problems). THE ONE WEEK LIMIT IS STRICTLY ENFORCED. See the University's Current Students website, or the Computer Science Handbook.
- A lot of students have missed out on a whole semester of study because they just went away. Many students have failed an examination because they did not report problems until they received the failing grade. In general, if there is a problem that will affect your study you should speak to someone as soon as possible.
- Students should sit the examination if at all possible, even if they do nothing much more than hand in a script with their name.
- It would also help if students read the examinations handbook that they receive, and double-check (triple-check?) the examination timetable.
- Archived announcements.
Tentative Schedule
Note: the date listed for student presentation #x is the approximate date on which this presentation will occur; dates will be adjusted when students drop. Students will be assigned numbers by a random process during the first week of classes.
- Week 1 (17 July - 21 July). Select class
representative.
- Handout 1, General Information (revised 20 July to show the correct time for Friday's lectures)
- Handout 2, Selection of Oral Presentations (revised 20 July 06: M = 0.6N)
- Handout 3, List of Suggested Articles for Oral Presentations (18 July 06)
- Handout 4, Randomly Assigned Student Numbers (version 1.5 of 9 August 06: N = 16, M = 12)
- Handout 5, First set of Lecture Slides (revised 21 July 06: slide 20 updated).
- [R1] B. Lampson, "Computer Security in the Real World", IEEE Computer 37:6, 37-46, June 2004.
- [R2] Computer System Statute 2000, University of Auckland. Available http://www.auckland.ac.nz/security/images/ComputerStatute.pdf, July 2006.
- [R3] "IT Acceptable Use Policy", Version 1.3, The University of Auckland, 2004 (available: http://www.auckland.ac.nz/security/ITAcceptableUsePolicy.htm, July 2006).
- [R4] "Department of Computer Science Computer System Regulations", 1999 (available: https://www.cs.auckland.ac.nz/administration/handbook/ugrad/UG.DoCSCSR.html, July 2006).
- Week 2 (24 July - 28 July). Select papers and dates for student
oral presentations in Weeks 5-13.
- Handout 6, Articles to be Presented by Students (Version 1.70: 11 October 06).
- Handout 7, Oral Presentations, Projects and Term Reports, 28 July 06.
- Week 3 (31 July - 4 August). Finalise the selection of papers
and dates for student oral presentations. Discuss how to
prepare an oral presentation. Discuss term project requirements.
- Handout 8, Software Law and Ethics, 28 July 06.
- [R5] "What Are Patents, Trademarks, Servicemarks, and Copyrights?", US Patent and Trademark Office, 13 May 2004 (available: http://www.uspto.gov/web/offices/pac/doc/general/whatis.htm, July 2006).
- [R6] "Patent Basics", Office of Technology Transfer, Clemson University (available: http://www.clemson.edu/research/ottSite/ottStart_IntelectPatents.htm, July 2006).
- [R7] "Copyright Office Basics", U.S. Copyright Office, July 2006 (available: http://www.copyright.gov/circs/circ1.html, July 2006).
- [R8] "Copyright Protection in New Zealand", Ministry of Economic Development, November 2005 (available: http://www.med.govt.nz/templates/Page____7290.aspx, July 2006).
- [R9] K. Nichols, "The Age of Software Patents", IEEE Computer 32:4, 25-31, April 1999.
- [R10] P. Samuelson, "Encoding the Law into Digital Libraries", Comm. ACM 41:4, 13-18, April 1998.
- [R11] IEEE Code of Ethics, February 2006 (available: http://www.ieee.org/web/membership/ethics/code_ethics.html, July 2006).
- [R12] Summary Code of Professional Standards and Ethics, Royal Society of New Zealand, 2003. (available: http://www.rsnz.govt.nz/directory/code_ethics.php, July 2006).
- [R13] "The Ten Commandments of Computer Ethics", Computer Ethics Institute, 1992 (available: http://www.brook.edu/its/cei/overview/Ten_Commanments_of_Computer_Ethics.htm, July 2006).
- [R14] H. Rosner, "Steal this software," The.Standard.com, 21 June 2000 (available: http://www.cnn.com/2000/TECH/computing/06/21/steal.software.idg/, July 2006).
- [R15] P. Radatti, "Cybersoft, Incorporated Moral Guidelines," Cybersoft, Inc, May 1995 (available: http://www.cybersoft.com/whitepapers/papers/locks.shtml, July 2006).
- Week 4 (7 August - 11 August). Tutorial sessions:
Students #1 - #4 give practice oral presentations.
- Handout 9, Report Writing 1 (revised 13 September 2006: updated hyperlinks).
- Handout 10, Cryptography and Steganography (revised 15 Aug 06: slide 11 corrected).
- [R16] M. Stamp, Information Security: Principles and Practice, John Wiley & Sons, Inc., September 2005, pp. 1-7, 11-21, 26-30, 33-39, 50-51, 54-55, 61-62, 75-81, 85-87, 100-104.
- Week 5 (14 August - 18 August). Student oral presentations #1 -
#4: each presentation will be 10 minutes in length, with an 8-minute
discussion period. Tutorial sessions: Students #5 - #8
give practice oral presentations.
- Assignment 1 due by email to instructor before lecture of Friday 18 August: Term paper or project proposal (one sentence).
- Week 6 (21 August - 25 August). Student oral presentations
#5 - #8. No lecture on Friday 25 August.
Term break (28 August - 10 September)
- Week 7 (11 September - 15 September). Tutorial sessions:
Students #9 - #12 give practice oral presentations. No lecture on
Monday 11 September.
- Assignment 2 due by email to instructor before lecture of Friday 15 September: first draft of title, synopsis and references (with complete bibliographic detail) for term paper; or goal statement of term project, list of software & hardware resources required and a plan for obtaining these, and proposed methodology.
- [R17] M. Stamp, Information Security: Principles and Practice, John Wiley & Sons, Inc., September 2005, pp. 325-338.
- Handout 11, Trusted Operating Systems (Mark Stamp's lecture slides).
- Week 8 (18 September - 22 September). Student oral
presentations #9 - #12. Tutorial sessions: Students #13 -
#16 give practice oral presentations.
- Week 9 (25 September - 29 September). Student oral presentations
#13 - #16. Tutorial sessions: Students #17 - #20 give
practice oral presentations. No lecture on Monday 25 September and
Wednesday 27 September.
- Assignment 3 due Friday 29 September, by email to instructor, sent before lecture begins: title and abstract, for publication on class website; and a detailed outline of your term paper or project report.
- Handout 13: practice final exam, administered in class on Friday 29 September.
- Week 10 (2 October - 6 October).
Monday: student oral presentations #17 - #20.
Tutorial sessions:
Students #21 - #24 give practice oral presentations.
- Friday 6th October: Bradley Anstis, Director of Research and Product Development at Marshal Software, will give a guest lecture on the topic of "Content Security".
- Week 11 (9 October - 13 October). Student oral presentations #21 - #24. Tutorial sessions: cancelled.
- Week 12 (16 October - 20 October).
Friday: discussion of student answers to sample
final exam.
- Handout 12, Finalising your Term Paper.
- Handout 14: sample answers to practice final exam, revised 20 October. (The sample exam script is Handout 13.)
- Assignment 4 due in class Friday 20 October: hardcopy of final version of your term paper, with email sent to instructor before lecture.
- Final Examination. Date and time to be arranged. This will be a 2-hour examination, with a brief settling-in and exam-reading period before the examination begins. Closed book, no calculators. The location will be announced on the morning of the exam (and possibly as early as 5pm on the day prior to the exam), at nDeva, at the Exams Office website, and by hardcopy postings on campus.
-
Related Programmes