CSE 190 -- Lecture 2 -- Apr 1


Permissive Action Links and correspondence to computer security.

Threat model: what can the attackers do.

Started into security requirements.


[ CSE home | CSE talks | bsy's home page | webster i/f | yahoo | hotbot | lycos | altavista | pgp key svr | spam | commerce ]
picture of bsy

bsy+cse190@cse.ucsd.edu, last updated Wed Apr 15 13:42:08 PDT 1998.

email bsy


Don't make me hand over my privacy keys!