1 / 8

Course Overview

Course Overview. Dennis Kafura. Major Topics. Cryptography Use of encryption techniques to insure confidentiality and integrity of information vulnerable to unintended access or modification Critical issues Algorithms Structure (actors, shared information, processes)

nixie
Download Presentation

Course Overview

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Course Overview Dennis Kafura

  2. Major Topics • Cryptography • Use of encryption techniques to insure confidentiality and integrity of information vulnerable to unintended access or modification • Critical issues • Algorithms • Structure (actors, shared information, processes) • Mathematical foundations • Key generation • Basis (identity, attributes) • Trusted components • Key management • Revocation • Groups/communities

  3. Major Topics • Information flow control • Persistent confinement of information with predetermined bounds • Critical issues • Analysis • How to model information flow • How to describe bounds • Enforcement • Language level (programming constructs, run-time mechanisms) • System level (mechanisms for processes/threads, files, memory, etc.; covert channels) • Networked/distributed systems

  4. Major Topics • Privacy • “The right of the individual to decide what information about himself should be communicated to others and under what circumstances” (Westin, Privacy and Freedom, 1970.) • Critical Issues • Conceptual • How is privacy articulated • What are elemental factors of privacy • Effects of technology on privacy • Enabling new privacy controls • Undermining existing privacy conventions • Changing privacy conceptions and norms

  5. Course Web Site http://courses.cs.vt.edu/~cs6204/Privacy-Security

  6. Organization (*) Week of Nov 21: Thanksgiving Break (**) 7:45-9:45AM, if needed

  7. Course Work • Presentation of paper on one of three course topics • See Calendar on web site for dates/papers • Present one or two papers depending on class size • Make selection by September 6 • First-come, first-claimed • 50% of grade • Presentation of course project • Types • Literature project on topic of interest to you • Development project • Dates • September 15: term project approved • October 13: intermediate report • November 1 – December 6/13: presentation of term project • 50% of grade • Participation • Egregious lack of active/knowledgeable participation results in one letter grade penalty in final grade (e.g., A to B) • Only one warning

  8. Discussion • Questions? • Thoughts? • Comments?

More Related