This course introduces distributed systems security concepts and practices. The course starts by discussing core concepts of distributed systems such as characterization and models, communication and remote invocation, consistency, and replication. In addition, it discusses security protocols in distributed systems, including secure multiparty computation, access control, multi-level security, and secure distributed systems development. Finally, an introduction to mobile computing security is presented.
Undergraduate 132 CRs
Ross Anderson, Security Engineering: A Guide to Building Dependable Distributed Systems, Wiley Coulouris G., Jean Dollimore J., Kindberg T., and Blair G., Distributed Systems: Concepts and Design, Addison-Wesley
content serial | Description |
---|---|
1 | Course Introduction and Syllabus discussion |
2 | Characterization of Distributed Systems |
3 | Distributed Systems Models |
4 | Distributed Systems Models (cont.) |
5 | Security Engineering and Opponents in Distributed Systems |
6 | Security Protocols in Distributed Systems |
7 | Security Protocols in Distributed Systems (cont.) |
8 | 7th week Assessment |
9 | Secure Group Communication |
10 | Access Control and Multilevel Security |
11 | Secure Distributed Systems Development |
12 | 12th week Assessment |
13 | Secure Distributed Systems Development (cont.) |
14 | Mobile Computing Security |
15 | Projects Presentations |
Start your application