Guia de Cursos

Queres conhecer a oferta de cursos da NOVA, nas áreas das licenciaturas, mestrados e doutoramentos?
No nosso Guia de Cursos encontras informação útil sobre Faculdades, Institutos e Escolas.
Podes ainda aceder a informações complementares necessárias a uma completa integração.

saber mais Guia de Cursos

Faculdade de Ciências e Tecnologia

Computer Systems and Communications Security

Código

9232

Unidade Orgânica

Faculdade de Ciências e Tecnologia

Departamento

Departamento de Informática

Créditos

6.0

Professor responsável

Henrique João Lopes Domingos, José Augusto Legatheaux Martins

Horas semanais

2

Total de horas

16

Língua de ensino

Português

Objectivos

Knowledge:

  • Distributed systems and computer networks security concepts (security frameworks, security standards, attacks-threats typology and adversary models, computer systems and internetworking security models, dependability models, security properties, security services, security mechanisms, security foundation mechanisms and pervasive security mechanisms).
  • Applied computational cryptography: principles and foundations
  • TCP/IP security stack: layered security services and cross-layering security
  • Security applications and standards
  • Security services for wireless and ad-hoc networks
  • Security services for internetworked systems and cloud-computing solutions

Skills:

  • To define adversary models and attacks tipology, with a "security by design" approach.
  • To design and implement security protocols and services for distributed systems
  • To understand security solutions and experimental assessment of current research-oriented proposals in designing dependable distributed systems
  • To select appropriate cryptography to implement security protocols and services for wireless and ad-hoc sensor networks
  • To select approopriate cryptography mechanisms to design and to implement data-privacy and dependable solutions for cloud-computing and cloud-storage integrated distributed systems

Pré-requisitos

The course requires previous background on:

  • Computer networks: foundations, concepts, protocols and services
  • TCP/IP networks: TCP/IP layers and protocols
  • Distributed Systems: concepts, design principles, archirectural models and paradigms
  • Computer systems and networks security foundations, namely:
    • Foundations on applied-cryptography
    • TCP/IP security services, protocols and applications
    • Configuration and operation of WLAN security protocols and WLAN environments

Good programming skills are needed for "hands-on" work-assignments and mini-project development and experimental analysis:

  • Programming practice in JAVA (J2EE, J2SE or JDK environments) or .Net Languages
  • Practice with IDEs (ex., Eclipse, Netbeans, Studio .Net)
  • Programing support for Internetworking with TCP/IP
  • Distributed Systems Programmig Skills (sockets, RMI, WS, REST or messaging systems)
  • Some practice in programming with cryptographic algorithms and libraries
    • Ex, Java JCE and JCE crypto providers or .Net Cryptography Framework

Conteúdo

Course overview and introduction

  • Course overview
  • Introduction
    • Base topics and foundations
    • Complementary topics and on-going research

Base topics and foundations

  • Security frameworks and adversary models
  • Communications security: security services and mechanisms
  • Systems security and intrusion tolerance solutions
    • Trustworthy computing and Dependable Systems
    • Security infrastructures
  • Cryptography
    • Cryptography review: principles and foundations of applied cryptography
    • Complementary topics in applied cryptography
  • Network-security applications and protocols
  • Dependable system models combining security and reliability dimensions
  • Intrusion tolerance

Complementary on-going research topics (*)

  • Security in ad-hoc and wireless sensor networks
    • Security services for 802.15.4 and Zigbee networks
      • Data-link security solutions
      • Network level security and secure routing
      • Key-establishment and key-management protocols
      • Network processing and secure data-aggregation techniques
    • Intrusion tolerance services for AdHoc networks
    • Intrusion tolerance services for Wireless Sensor Networks
  • Dependability solutions for cloud-computing environments
    • Data-privacy and dependability solutions for cloud-computing systems
    • Secure data-management over public internet provided cloud-storage solutions


Bibliografia

Base bibliography

  • William Stallings, Cryptography and Network Security, 2011, Pearson Prentice-Hall 
  • William Stallings, Lawrie Brown, Computer Security: Principles and PracticeISBN 10: 0136004245 or  ISBN-13: 9780136004240, Pearson Prentice Hall, 2008.
  • William Stallings, Network Security Essentials: Applications and Standards 3/E, ISBN 10:0132380331, ISBN-13: 9780132380331, Pearson Prentice Hall, 2007

Complementary bibliography

  • Ross Anderson, Security Engineering: A Guide to Building Dependable Distributed Systems, 2001 Wiley
  • N. Ferguson, Bruce Schneier and T. Kohno, Cryptography Engineering, J. WIley & Sons, ISBN 9780470474242, 2010
  • Bruce Shneier, Applied Cryptography, 2md Edition. J. WIley & Sons, ISBN 0-471-12845-7 1996

Bibliography for complementary and on-going research topics

During the course, complementary references (specific book chapters and a selected set of papers) will be proposed for suggested readings and to support work-assignments. Research papers will be assigned for complementary study, according with the complementary topics of the course program, as well as, on-going research topics covered

Possible reference sources include: ACM SIGSAC, ACM SIGOPS, ACM CCS, ACM SASN, SAC, ICDCS, SENSORCOMM, DSN, IEEE Security and Privacy, IEEE Transactions on Dependable and Secure Computing. Specific bibliography will be suggested for readings, according with specific topics discussed/presented or proposed work-assignments

Other references on security-related conference proceedings or relevant journals, are accessible via the EMERALD Computer and Communications Security Abstracts, Relevant Journals and Conferences or see the ACM Digital Library (free access from the FCT Campus)

Método de ensino

Lectures for the presentation of  the main topics of the program. Lectures include tutorial guidance on suggested readings and proposed bibliography. Students must take in account the proposed readings, in a regular and permanent way, to follow the course in an appropriate way.

During the course, four seminars are organized for student''''s presentations on sets (three-four) of scientific articles or technical reports. Each set of papers is proposed as initial proposed readings. Students are challenged to combine the suggested readings with additional bibliographic research.

For the seminars, the students must submit 4 papers/technical reports, organized as short papers or summary-surveys (4-6 pages with a well defined format), with a presentation, discussion and a critical analysis of their readings. The papers, oral presentations and active participation in seminars will be evaluated as an important component of the continuous assessment and course participation.

Students are required to develop two work assignments for frequency assessment. These tasks include software design and development, involving experimental work and practical assessment or test benches,  with mandatory demonstrations in laboratory environment.

The work assignments are delivered by the students (with software sources and runtime archives) on previously defined dates, with a correspondent implementation report.

A final exam covering selected main topics completes the assessment process. The exam can be substituted by two frequency tests, during the semester.

Método de avaliação

Component CP (Course Participation): 20%

  • 4 seminars with participation assessment including oral presentations, diuscussion and work-preparation based on articles and surveys

Component WA (Work-Assignments): 30 %

  • 2 laboratory work-assignments and experimental work based on two software development mini-projects, with demonstration and discussion in laboratory environment.

Component FE (Frequency/Exam): 50%

  • Final exam or two frequency tests

Grade conditions (0-20 scale): 

  • FA (Final Assessment) = 20% CP + 30% WA + 50% FE
  • FA > 9.5
  • CP (average) > 9.5 with each component > 7
  • WA (average) > 9.5 with each component > 7
  • FE (average) > 9.5  with each component > 9.5

Cursos