An information security model defines access rights that express for a given system which subjects are allowed to perform which actions on which objects. A system is said to be secure with respect to a given information security model, if it enforces the corresponding access rights. Thus, access control modeling and access control systems represent the fundamental building blocks of secure services, be it on the Web or in the Internet of Everything.
(2 SWS + 2,0 x 2 SWS) x 15 + 30 h Klausurvorbereitung = 120h
Summary: the student is able to derive suitable access control models from scenario requirements and is able to specify concrete access control systems. The student is aware of the limits of access control models and systems with respect to their analyzability and performance and security characteristics. The student is able to identify the resulting tradeoffs. The student knows the state of the art with respect to current research endeavors in the field of access control.
Access Control Systems: Foundations and Practice
|Ort:||Raum 217, 20.21|
|Zeit:||donnerstags, 11.30 Uhr|
|Dozent:||Prof. Dr. Hannes Hartenstein
|Prüfung:||mündliche Prüfung nach Anmeldung über Fr. Hopprich|