Foundations of Computer and Information Security. This covers conspiracy in sharing in the Take-Grant Protection Model, security policies, policy models, and mechanisms. The class starts at 10:36…
I gave the following lecture in Zoom (COVID 19 era): Combinatorics in the Space of Monotone Paths of a Convex PolytopeAbstract Using a linear functional f on a convex polytope P induces an…