Lecture 1 - Access Control Models

Lecture Notes

Download here

Additional resources

  • Security in Computing, 5th edition, C. P. Pfleeger, S. L. Pfleeger, J. Margulies: Secs. 2.2, 7.2
  • Identity management: A primer, Williamson, G., Yip, D., Sharoni, I., Spaulding, K.: Chaps. 4, 6
  • Computer Security Art and Science, 2nd edition, Matt Bishop: Chaps. 2, 5, 6, 8, 16, 17
  • Segurança Informática nas Organizações, H. São Mamede: Secs. 2.2, 2.3.1, 3.1
  • Segurança em Redes Informáticas, 6ª Edição, A. Zúquete: Secs. 11.1, 11.2

Supplementary reading

Previous
Next