Algorithmen und Analysemethoden für Sicherheit in Cloud-Infrastrukturen (Sommersemester 2013)
Dozent: Prof. Dr. Andreas Polze
(Betriebssysteme und Middleware)
Website zum Kurs:
Cloud computing and highly distributed systems pose new challenges for designing secure secure software because the differ from traditional systems in several aspects:
Limited Trust in Infrastructure
In a traditional approach to engineering secure systems, security-sensitive software components (e.g. authentication) would only be deployed on infrastructure which is assumed to be completely trustworthy. Cloud resources do not fit in that category: Business contracts and service level agreements build confidence, however, cloud resources are outside of the users immediate domain of control and may even be under foreign legislation.
Services that are exposed to the public have to deal users that are unknown to the operator of the service: This is beyond traditional means of access control, where an operator is assumed to have knowledge about the users of the system.
A prime virtue of cloud infrastructures is scalability, which enables a service to handle a large number of users. This requires self-managing access control mechanisms without the need for manual administration.
In the face of these challenges new security mechanisms and cryptographic protocols have been developed in the recent years which are not usually covered in basic CS lectures. This seminar aims at broadening the perspective to the recent developments in this field.
This seminar focuses on work with scientific publications. For the given topic, you should and identify the state of the are from related and identify the main contribution(s) of the given publications. We expect participants to give a 40-45 min presentation on the topic and create a written report.
In you presentation, you should describe:
- The purpose of the mechanism and its field of application
- The state of the art in research (and application, if it exists)
- The "mathematical trick" that the mechanism is based on (a simplified version may be okay in some cases)
- An understandable example (again, simplified mathematics are okay here)
You report should:
- Consist of roughly 10-15 pages
- Describe the purpose of the mechanism and its field of application
- Provide a good overview of related work and include comprehensive bibliography
- Also contain the mathematical foundation and example from the presentation
- Semesterwochenstunden : 2
- ECTS : 3
- Benotet :
- Einschreibefrist : 10.2.2013 - 30.4.2013
- Lehrform : S
- Belegungsart : Wahlpflicht
Studiengänge & Module
IT-Systems Engineering BA
- Internet & Security Technology
- Operating Systems & Information Systems Technology
- Software Architecture & Modeling Technology