CSE 190 -- Lecture 2 -- Apr 1
Permissive Action Links and correspondence to computer security.
Threat model: what can the attackers do.
Started into security requirements.
CSE home |
CSE talks |
bsy's home page |
webster i/f |
pgp key svr |
email@example.com, last updated Wed Apr 15 13:42:08 PDT 1998.email bsy