1 / 12

563.0 Introduction

563.0 Introduction. Carl A. Gunter University of Illinois Fall 2007. Course Basics. Objective: develop research interests in security. Prerequisites Maturity in CS and strong interest in security. Knowledge of security basics (viz. 400-level course). Helpful: research experience.

lapis
Download Presentation

563.0 Introduction

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. 563.0 Introduction Carl A. Gunter University of Illinois Fall 2007

  2. Course Basics • Objective: develop research interests in security. • Prerequisites • Maturity in CS and strong interest in security. • Knowledge of security basics (viz. 400-level course). • Helpful: research experience.

  3. You Will • Select a recommended topic. • Discover, understand, and present related work in your selected topic. • Finalize the formulation of a research problem and a research team. • Develop primary materials addressing the problem. • Present your primary materials in a demo. • Demonstrate your understanding of general concepts in all focus areas.

  4. I Will • Choose the recommended topics. • Provide some background on these topics. • Suggest some sample research questions. • Provide platform assistance. • Guide your efforts.

  5. Your Deliverables • 35 minute background presentation (per person). • Sample primary materials (per group): • Simulation • Implementation • Theorem and proof. • 35 minute demo presentation (per group). • Standard in-class exam. • 1:30-4:30 PM, Tuesday December 11.

  6. Recommended Topics • Fundamentals and five areas of widespread research interest in security. • Fundamentals • Unwanted traffic on the Internet • Secure web services • Tamper-resistant systems • Monitoring and surveillance • Critical infrastructure protection

  7. Format • Background lectures (mainly by me) at the beginning. • Meetings with topic groups. • More background lectures (by you). • Project meetings with me, for most of the course. • Project demos. • Final exam.

  8. Research Materials • Primary materials (raw data): • Simulation results, prototype code, experimental data, test beds. • Detailed proofs and counter-examples. • Technical specifications, architectural diagrams. • Secondary materials (write-ups): • Publications: journals, symposia, conferences, or workshops. Web pages and tech reports. • Slide presentations and demos. • Tertiary materials: • Survey articles, tutorials, textbooks. • Magazines and news reports.

  9. Research Proposals • Research problem statement (elevator pitch). • Four panel slide. • Project description. • Detailed research proposal.

  10. Research Problem Statement • Topic. • I am studying messaging systems, secure web services, and security policies • Research question or original objective. • so I can create messaging systems that are based on web services and adapt to policies • Who cares? • so the distributed computing community • Why should they care? • will better understand how to provide more flexible, secure and integrated messaging.

  11. Project Name OpEm Project University of Pennsylvania Logo Approach Limited on-device programming analyzed formally. Java provides portability and aids analysis. Explore delivery challenges. Four Panel Slide – Example 1 • Problem Statement • Open APIs aid flexible response to req’s. • Challenged by portability, flexibility, predictability, deliverability. • Plans and Progress • Designs and prototypes for programmable m/w and payment card. • Plan general model-based design for smart cards.

  12. Project Name AMPol Project University of Illinois Logo Approach Web services and serviced oriented architecture. Advanced policy mechanisms. Explore advanced architectures and incremental applications. Four Panel Slide – Example 2 • Problem Statement • Messaging systems are based on legacy architectures • Challenged by flexibility, security and integration. • Plans and Progress • WSEmail prototype. • Adaptive messaging application demonstration. • Attribute based messaging application demonstration.

More Related