Sommer
2010

Security / Identity Management
Seminar, 2 SWS

Instructor: Dr. Wolf Müller
Tuesday, 15:15-16:45, RUD 25 ,4.113


Computer Science Department
Systems Architecture Group

 

 
Abstract: As a user of the Internet, you are fortunate to be tied into the world's greatest communication and information exchange - but not without a price. As a result of this connection, your computer, your organization's network, and everywhere the network reaches are all vulnerable to potentially disastrous infiltration by hackers. [W. Cheswick. Firewalls and Internet Security] 
Synopsis:
  • Seminar, Praktische Informatik, Hauptstudium.
  • 2h each week, over one semester (2 SWS).
  • Students will present a selection of papers that will help you understand which threats exist, judge their significance and learn methods to defend your system against hackers. In addition you will explore the mathematical underpinnings of today's most common security tools and protocols. But most of all you will learn that there is no absolute security - i.e. your will have to learn ways to detect security breaches and recover from them.

Credits:

  In order to obtain credits for this seminar, participants are expected to:

  • Attend regularly (at least 90%).
  • Read each paper before the seminar, to be adequately prepared for discussion.
  • Research an assigned subject; present major findings (45 min presentation; 30 min discussion).
  • Presentations will be evaluated by two members of the audience at the end of each class (Bewertungskriterien-Seminarvortrag.pdf).
  • Presenters summarize their presentation and relevant discussion on the Seminar's WIKI page within 2 weeks.
  • Presentations may be given in English or German. All documents are in English (exceptions may be granted).

Prerequisites:

  • This seminar is suitable for students of all technical science disciplines who have previously completed courses PI 1,2,3 or equivalent.

Wiki:

Syllabus:

  • nPA (neuer Personalusweis) [Broschüre] [TR] (Robert Göttsch)
  • PACE (Paul Bastian)
  • NFC, Ideen, Konzepte & Geschäftsmodelle [->] (Magnus Müller)
  • eCard-API für mobile Endgeräte (Kristian Beilke)
  • Signieren mit dem nPA [TR]
  • Chipkartenleser für den nPA und ccid [TR] (Uwe Ritzschke)
  • Microsoft Cardspace [Chapter 2] (Papier) (Fabian Weber)
  • WS-Security, XML-sig, XML-enc (Buch) (Andreas Grüner)
  • SAML 2.0 (Martin Schröder)
  • DE-Mail (https://www.bsi.bund.de/DE/Themen/EGovernment/DeMail/DeMail_node.html) (Stephan Verbücheln, Martin Maunz)
  • U-Prove [Artikel](Tobias Mühl)
  • oAuth [http://www.iam-wiki.org/Home], Xauth [golem] (Sven Sengpiehl)
  • eGK (Gérard Baecker)
  • Paring-Mechanismen (Jan Fajerski)
  • Konzepte zur Begrenzung der Verfügbarkeit von Daten im Web
  • OpenID (Zheng Wang)
  • RFID (Jonas Liepe)

DatePresentersTopicSlides
13.04.10 3. Berliner Signaturkonferenz (eingeladener Vortrag)  
20.04.10Dr. Wolf Müllerbootstrap / Themenvergabe 
27.04.10 Vorbereitung 
04.05.10 Kurzvortrag (elevator speach) 
11.05.10 Vorbereitung preparation  
18.05.10Jonas Liepe
Magnus Müller
RFID
NFC
-
[pdf]
25.05.10Paul Bastian
Robert Göttsch
PACE
nPA
[pdf]
01.06.10Kristian Beilke
Uwe Ritzschke
eCard-API
Chipkartenleser
[pdf]
[pdf]
08.06.10Gérard Baecker
Jan Fajerski
eGK
Pairing
[pdf]
[pdf]
15.06.10Martin Schröder
Andreas Grüner
SAML
WS-Security
[pdf]
[pdf]
22.06.10Tobias Mühl
Fabian Weber
U-Prove
MS Cardspace
[pdf]
-
29.06.10Stephan Verbücheln
Martin Maunz
DE-Mail
 
[pdf]
[pdf]
06.07.10Zheng Wang
Jonas Liepe
OpenID (EN)
RFID

[pdf]
13.07.10Sven Sengpiehl
Dr. Wolf Müller
*auth
Projekte um den nPA am Lehrstuhl SAR
[pdf]


Links & Material

Further Readings (Books):cover

 

 Links
Cambridge
Ross Anderson's home page
Bruce Schneier
home page
Safe Personal Computing
(DE)
NIH
Computer Security Information
NIST
Computer Security Resource Center
NIST
Federal Information Processing Standards Publications (FIPS)
CERT
 
cert.org
BSI
Bundesamt für Sicherheit in der Informationstechnik
Biometrics
The Biometric Consortium
Overview (german)
OS specific
Windows-Security
Linux-Security
e-Learning
CrypTool (de)

Legal disclaimer. .  © 2024 Humboldt-Universität zu Berlin, Computer Science Department, Systems Architecture Group.Contact: sar@informatik.hu-berlin.de .