CSE 190 -- Lecture 2 -- Apr 1
Permissive Action Links and correspondence to computer security.
Threat model: what can the attackers do.
Started into security requirements.
[
CSE home |
CSE talks |
bsy's home page |
webster i/f |
yahoo |
hotbot |
lycos |
altavista |
pgp key svr |
spam |
commerce
]
bsy+cse190@cse.ucsd.edu, last updated Wed Apr 15 13:42:08 PDT 1998.
email bsy