Praktikum Access Control Systems
- Typ: Praktikum (P)
- Semester: SS 2019
-
Zeit:
25.04.2019
14:00 - 15:30 wöchentlich
20.29 Pool F
20.29 Containerbau am Zirkel
02.05.2019
14:00 - 15:30 wöchentlich
20.29 Pool F
20.29 Containerbau am Zirkel
09.05.2019
14:00 - 15:30 wöchentlich
20.29 Pool F
20.29 Containerbau am Zirkel
16.05.2019
14:00 - 15:30 wöchentlich
20.29 Pool F
20.29 Containerbau am Zirkel
23.05.2019
14:00 - 15:30 wöchentlich
20.29 Pool F
20.29 Containerbau am Zirkel
06.06.2019
14:00 - 15:30 wöchentlich
20.29 Pool F
20.29 Containerbau am Zirkel
13.06.2019
14:00 - 15:30 wöchentlich
20.29 Pool F
20.29 Containerbau am Zirkel
27.06.2019
14:00 - 15:30 wöchentlich
20.29 Pool F
20.29 Containerbau am Zirkel
04.07.2019
14:00 - 15:30 wöchentlich
20.29 Pool F
20.29 Containerbau am Zirkel
11.07.2019
14:00 - 15:30 wöchentlich
20.29 Pool F
20.29 Containerbau am Zirkel
18.07.2019
14:00 - 15:30 wöchentlich
20.29 Pool F
20.29 Containerbau am Zirkel
25.07.2019
14:00 - 15:30 wöchentlich
20.29 Pool F
20.29 Containerbau am Zirkel
-
Dozent:
Jan Grashöfer
Florian Jacob - SWS: 2
- LVNr.: 2400094
-
Hinweis:
Die Anmeldung erfolgt über das Wiwi-Portal: https://portal.wiwi.kit.edu/ys/2732
Lehrinhalt | An information security model defines access rights that express for a given system which subjects are allowed to perform which actions on which objects. A system is said to be secure with respect to a given information security model, if it enforces the corresponding access rights. Thus, access control modeling and access control systems represent the fundamental building blocks of secure services, be it on the Web or in the Internet of Everything. |
Arbeitsbelastung | Treffen mit den Betreuern: etwa 10h Vor-/Nachbereitung, Bearbeitung der Aufgaben: 110h Gesamt: 120h (4 ECTS Punkte) |
Ziel | The student is able to derive suitable access control models from scenario requirements and is able to specify concrete access control systems. The student is aware of current access control frameworks and technologies. The student is able to formulate a suitable system architecture for a given access control scenario. The student is able to identify concrete technologies to implement an access control system securely and efficiently. The student is able to evaluate the suitability of a given access control system architecture for a given scenario. |