Forschungsgruppe Dezentrale Systeme und Netzdienste - KASTEL

Praktikum Access Control Systems

  • Typ: Praktikum (P)
  • Semester: SS 2019
  • Zeit: 25.04.2019
    14:00 - 15:30 wöchentlich
    20.29 Pool F
    20.29 Containerbau am Zirkel


    02.05.2019
    14:00 - 15:30 wöchentlich
    20.29 Pool F
    20.29 Containerbau am Zirkel

    09.05.2019
    14:00 - 15:30 wöchentlich
    20.29 Pool F
    20.29 Containerbau am Zirkel

    16.05.2019
    14:00 - 15:30 wöchentlich
    20.29 Pool F
    20.29 Containerbau am Zirkel

    23.05.2019
    14:00 - 15:30 wöchentlich
    20.29 Pool F
    20.29 Containerbau am Zirkel

    06.06.2019
    14:00 - 15:30 wöchentlich
    20.29 Pool F
    20.29 Containerbau am Zirkel

    13.06.2019
    14:00 - 15:30 wöchentlich
    20.29 Pool F
    20.29 Containerbau am Zirkel

    27.06.2019
    14:00 - 15:30 wöchentlich
    20.29 Pool F
    20.29 Containerbau am Zirkel

    04.07.2019
    14:00 - 15:30 wöchentlich
    20.29 Pool F
    20.29 Containerbau am Zirkel

    11.07.2019
    14:00 - 15:30 wöchentlich
    20.29 Pool F
    20.29 Containerbau am Zirkel

    18.07.2019
    14:00 - 15:30 wöchentlich
    20.29 Pool F
    20.29 Containerbau am Zirkel

    25.07.2019
    14:00 - 15:30 wöchentlich
    20.29 Pool F
    20.29 Containerbau am Zirkel


  • Dozent:

    Jan Grashöfer
    Florian Jacob

  • SWS: 2
  • LVNr.: 2400094
  • Hinweis:

    Die Anmeldung erfolgt über das Wiwi-Portal: https://portal.wiwi.kit.edu/ys/2732

Lehrinhalt

An information security model defines access rights that express for a given system which subjects are allowed to perform which actions on which objects. A system is said to be secure with respect to a given information security model, if it enforces the corresponding access rights. Thus, access control modeling and access control systems represent the fundamental building blocks of secure services, be it on the Web or in the Internet of Everything.
In this master-level course, we thoroughly investigate the evolution of access control models (access control matrix, role-based access control, attribute access control) and describe usage control models as a unified framework for both access control and digital rights management. The students experiment with real-world access control protocols and technologies and thus apply the contents of the lecture "Access Control Systems: Foundations and Practice" in a real-world context.

Arbeitsbelastung

Treffen mit den Betreuern: etwa 10h

Vor-/Nachbereitung, Bearbeitung der Aufgaben: 110h

Gesamt: 120h (4 ECTS Punkte)

Ziel

The student is able to derive suitable access control models from scenario requirements and is able to specify concrete access control systems.

The student is aware of current access control frameworks and technologies.

The student is able to formulate a suitable system architecture for a given access control scenario.

The student is able to identify concrete technologies to implement an access control system securely and efficiently.

The student is able to evaluate the suitability of a given access control system architecture for a given scenario.