Diese Seite auf DE

Event

Practical Course Access Control Systems [SS202400094]

Type
internship (P)
Term
SS 2020
SWS
2
Language
Deutsch/Englisch
Appointments
13
Links
ILIAS

Lecturers

Organisation

  • KASTEL Hartenstein

Part of

Appointments

  • 24.04.2020 14:00 - 15:30 - Room: 20.21 Pool F
  • 08.05.2020 14:00 - 15:30 - Room: 20.21 Pool F
  • 15.05.2020 14:00 - 15:30 - Room: 20.21 Pool F
  • 22.05.2020 14:00 - 15:30 - Room: 20.21 Pool F
  • 29.05.2020 14:00 - 15:30 - Room: 20.21 Pool F
  • 05.06.2020 14:00 - 15:30 - Room: 20.21 Pool F
  • 12.06.2020 14:00 - 15:30 - Room: 20.21 Pool F
  • 19.06.2020 14:00 - 15:30 - Room: 20.21 Pool F
  • 26.06.2020 14:00 - 15:30 - Room: 20.21 Pool F
  • 03.07.2020 14:00 - 15:30 - Room: 20.21 Pool F
  • 10.07.2020 14:00 - 15:30 - Room: 20.21 Pool F
  • 17.07.2020 14:00 - 15:30 - Room: 20.21 Pool F
  • 24.07.2020 14:00 - 15:30 - Room: 20.21 Pool F

Note

An information security model defines access rights that express for a given system which subjects are allowed to perform which actions on which objects. A system is said to be secure with respect to a given information security model, if it enforces the corresponding access rights. Thus, access control modeling and access control systems represent the fundamental building blocks of secure services, be it on the Web or in the Internet of Everything.
In this master-level course, we thoroughly investigate the evolution of access control models (access control matrix, role-based access control, attribute access control) and describe usage control models as a unified framework for both access control and digital rights management. The students experiment with real-world access control protocols and technologies and thus apply the contents of the lecture "Access Control Systems: Foundations and Practice" in a real-world context.

Amount of Work

Meeting with advisors: ca. 10h
Preparation and follow-up, completion of assignments: 110h

120h = 4 ECTS

Learning Objectives

The student is able to derive suitable access control models from scenario requirements and is able to specify concrete access control systems.

The student is aware of current access control frameworks and technologies.

The student is able to formulate a suitable system architecture for a given access control scenario.

The student is able to identify concrete technologies to implement an access control system securely and efficiently.

The student is able to evaluate the suitability of a given access control system architecture for a given scenario.