Technische Universität Ilmenau

Systems Security - Modultafeln der TU Ilmenau

Die Modultafeln sind ein Informationsangebot zu unseren Studiengängen. Rechtlich verbindliche Angaben zum Verlauf des Studiums entnehmen Sie bitte dem jeweiligen Studienplan (Anlage zur Studienordnung). Bitte beachten Sie diesen rechtlichen Hinweis. Angaben zum Raum und Zeitpunkt der einzelnen Lehrveranstaltungen entnehmen Sie bitte dem aktuellen Vorlesungsverzeichnis.

Fachinformationen zu Systems Security im Studiengang Master Research in Computer & Systems Engineering 2016
Fachnummer100963
Prüfungsnummer2200414
FakultätFakultät für Informatik und Automatisierung
Fachgebietsnummer 2255 (Verteilte Systeme und Betriebssysteme)
Fachverantwortliche(r)Prof. Dr. Winfried Kühnhauser
TurnusSommersemester
SpracheEnglisch
Leistungspunkte5
Präsenzstudium (h)34
Selbststudium (h)116
VerpflichtungPflicht
Abschlussmündliche Prüfungsleistung, 20 Minuten
Details zum Abschluss

direct grade

max. Teilnehmerzahl
Vorkenntnisse

BSc Computer Science, especially algorithms and complexity, automata and formal languages, operating systems, networks, discrete structures

Lernergebnisse

This course focuses on the basic paradigms, methods and concepts in the field of model-based security engineering - the methodical process of engineering a computer system's security properties based on formal security models. In an early stage of the engineering process formal security models are used for the precise and unambiguous representation of security policies which then are analyzed by static model checking and simulative model execution. Successful models afterwards are transformed via specification languages into executable code which finally is integrated into a system’s trusted computing base.

Students acquire knowledge on methodological engineering of security properties based on security policies and their formal models. Successful students will be able to design, analyze and specify security policies and integrate them into the trusted computing base of IT systems.

Inhalt

Course topics are

  • Security Requirements analysis
  • Security policies and formal security models
  • Model engineering and analysis
  • Policy specification languages
  • Security mechanisms
  • Trusted computing bases, security architectures and reference monitors
Medienformen

Presentations with projector and whiteboard, books, papers, assignments, discussions

Literatur
  • William Stallings, Lawrie Brown: Computer Security. Pearson, 2nd Edition, 2012, 810 pages.

  •  Matthew Bishop: Computer Security: Art and Science. Addison-Wesley Educational Publishers Inc, 2012 (2. Edition), 1168 pages.

  •  Trent Jaeger: Operating System Security. Synthesis Lectures on Information Security, Privacy and Trust #1, Morgan & Claypool Publishers, 2008.

  •  N. Akosan et. al.: Mobile Platform Security. Synthesis Lectures on Information Security, Privacy and Trust #9, Morgan & Claypool Publishers, 2014.

  •  Anupam Datta et. al.: Analysis Techniques for Information Security. Synthesis Lectures on Information Security, Privacy and Trust #2, Morgan & Claypool Publishers, 2010.

  •  Ross Anderson: Security Engineering. John Wiley & Sons, 2nd Edidtion, 2008, 1040 pages. Also available online.

  •  Frank Mayer, Karl Macmillan, David Caplan: SELinux by Example. Prentice Hall 2007, 425 pages.

  •  Bruce Schneier: Secrets and Lies - Digital Security in a Networked World. John Wiley & Sons 2000, 408 pages.

Lehrevaluation

Pflichtevaluation:

SS 2017 (Fach)

Freiwillige Evaluation:

SS 2014 (Seminar)

SS 2016 (Seminar)

Hospitation:

Informationen und Handreichungen zur Pflege von Modul- und Fachbeschreibungen durch den Modul- oder Fachverantwortlichen finden Sie auf den Infoseiten zum Modulkatalog.