FI:PV157 Authentication and AC - Course Information
PV157 Authentication and Access Control
Faculty of InformaticsAutumn 2022
- Extent and Intensity
- 2/0. 2 credit(s) (plus extra credits for completion). Recommended Type of Completion: zk (examination). Other types of completion: k (colloquium).
- Teacher(s)
- prof. RNDr. Václav Matyáš, M.Sc., Ph.D. (lecturer)
Ing. Mgr. et Mgr. Zdeněk Říha, Ph.D. (assistant)
Mgr. et Mgr. Jan Krhovják, Ph.D. (assistant)
JUDr. Pavel Loutocký, Ph.D., BA (Hons) (lecturer)
RNDr. Agáta Kružíková, Ph.D. (assistant) - Guaranteed by
- prof. RNDr. Václav Matyáš, M.Sc., Ph.D.
Department of Computer Systems and Communications – Faculty of Informatics
Supplier department: Department of Computer Systems and Communications – Faculty of Informatics - Timetable
- Tue 8:00–9:50 D2
- Prerequisites
- Register this course after PV080.
- Course Enrolment Limitations
- The course is also offered to the students of the fields other than those the course is directly associated with.
- fields of study / plans the course is directly associated with
- Image Processing and Analysis (programme FI, N-VIZ)
- Applied Informatics (programme FI, B-AP)
- Applied Informatics (programme FI, N-AP)
- Information Technology Security (eng.) (programme FI, N-IN)
- Information Technology Security (programme FI, N-IN)
- Bioinformatics and systems biology (programme FI, N-UIZD)
- Bioinformatics (programme FI, B-AP)
- Bioinformatics (programme FI, N-AP)
- Computer Games Development (programme FI, N-VIZ_A)
- Computer Graphics and Visualisation (programme FI, N-VIZ_A)
- Computer Networks and Communications (programme FI, N-PSKB_A)
- Cybersecurity Management (programme FI, N-RSSS_A)
- Discrete algorithms and models (programme FI, N-TEI)
- Formal analysis of computer systems (programme FI, N-TEI)
- Graphic design (programme FI, N-VIZ)
- Graphic Design (programme FI, N-VIZ_A)
- Hardware Systems (programme FI, N-PSKB_A)
- Hardware systems (programme FI, N-PSKB)
- Image Processing and Analysis (programme FI, N-VIZ_A)
- Information security (programme FI, N-PSKB)
- Information Systems (programme FI, N-IN)
- Informatics with another discipline (programme FI, B-EB)
- Informatics with another discipline (programme FI, B-FY)
- Informatics with another discipline (programme FI, B-IO)
- Informatics with another discipline (programme FI, B-MA)
- Informatics with another discipline (programme FI, B-TV)
- Informatics (programme FI, B-INF) (2)
- Public Administration Informatics (programme FI, B-AP)
- Informatics in education (programme FI, B-IVV) (2)
- Information Security (programme FI, N-PSKB_A)
- Quantum and Other Nonclassical Computational Models (programme FI, N-TEI)
- Mathematical Informatics (programme FI, B-IN)
- Deployment and operations of software systems (programme FI, N-SWE)
- Design and development of software systems (programme FI, N-SWE)
- Parallel and Distributed Systems (programme FI, B-IN)
- Parallel and Distributed Systems (programme FI, N-IN)
- Computer graphics and visualisation (programme FI, N-VIZ)
- Computer Graphics and Image Processing (programme FI, B-IN)
- Computer Graphics (programme FI, N-IN)
- Computer Networks and Communication (programme FI, B-IN)
- Computer Networks and Communication (programme FI, N-IN)
- Computer Networks and Communications (programme FI, N-PSKB)
- Computer Systems and Data Processing (programme FI, B-IN)
- Computer Systems (programme FI, N-IN)
- Principles of programming languages (programme FI, N-TEI)
- Programming and development (programme FI, B-PVA)
- Embedded Systems (eng.) (programme FI, N-IN)
- Programmable Technical Structures (programme FI, B-IN)
- Embedded Systems (programme FI, N-IN)
- Cybersecurity management (programme FI, N-RSSS)
- Services development management (programme FI, N-RSSS)
- Software Systems Development Management (programme FI, N-RSSS)
- Services Development Management (programme FI, N-RSSS_A)
- Service Science, Management and Engineering (eng.) (programme FI, N-AP)
- Service Science, Management and Engineering (programme FI, N-AP)
- Social Informatics (programme FI, B-AP)
- Software Systems Development Management (programme FI, N-RSSS_A)
- Software Systems (programme FI, N-PSKB_A)
- Software systems (programme FI, N-PSKB)
- Machine learning and artificial intelligence (programme FI, N-UIZD)
- Theoretical Informatics (programme FI, N-IN)
- Teacher of Informatics and IT administrator (programme FI, N-UCI)
- Informatics for secondary school teachers (programme FI, N-UCI) (2)
- Upper Secondary School Teacher Training in Informatics (programme FI, N-SS) (2)
- Artificial Intelligence and Natural Language Processing (programme FI, B-IN)
- Artificial Intelligence and Natural Language Processing (programme FI, N-IN)
- Computer Games Development (programme FI, N-VIZ)
- Processing and analysis of large-scale data (programme FI, N-UIZD)
- Image Processing (programme FI, N-AP)
- Natural language processing (programme FI, N-UIZD)
- Course objectives
- The course aims to advance the knowledge of PV080 graduates in the areas of authentication and access control, to teach the students to:
explain interdependencies and relations between different methods of authentication and access control;
estimate applicability of moder biometric authentication methods, their impact and practical problems;
judge methods of authentication in computer systems;
estimate pros and cons of different methods of authentication and access control;
apply different approaches to the design authentication solutions. - Learning outcomes
- A graduate of this course will be able to:
explain interdependencies and relations between different methods of authentication and access control;
estimate applicability of moder biometric authentication methods, their impact and practical problems;
judge methods of authentication in computer systems;
estimate pros and cons of different methods of authentication and access control;
apply different approaches to the design authentication solutions. - Syllabus
- Authentication of users: secret information, tokens. Introduction to biometric authentication. Frequently used biometrics. Problems of deploying biometrics. Data authentication. Electronic signature and its use. Authentication of machines and applications. Authorization and access control. Discretionary access control. Multilevel systems. Autentication and authorization techniques in current ICT systems.
- Literature
- required literature
- VAN OORSCHOT, Paul C. Computer security and the Internet : tools and jewels. Cham: Springer, 2020, xxiii, 365. ISBN 9783030336486. info
- recommended literature
- MATYÁŠ, Václav (Vašek) and Jan KRHOVJÁK. Autorizace elektronických transakcí a autentizace dat i uživatelů (User authentication and electronic transaction authorization). 1st ed. Brno: Masarykova univerzita, 2008, 128 pp. 1. ISBN 978-80-210-4556-9. info
- RAK, Roman, Václav MATYÁŠ, Zdeněk ŘÍHA, Viktor PORADA, Ondřej BITTO, John DAUGHMAN, Jean HENNEBERT, Danka SEIGOVÁ, Vlastimil STENZL, Jiří STRAUS, Marie SVOBODOVÁ and Halina ŠIMKOVÁ. Biometrie a identita člověka - ve forenzních a komerčních aplikacích (Biometrics and human identity - in forensic and commercial applications). Praha: Grada Publishing, a.s., 2008, 664 pp. Profesionál. ISBN 978-80-247-2365-5. URL info
- Teaching methods
- lectures
- Assessment methods
- Written final exam (about 70% of points), written mid-term exam (approx. 30% of points)
- Language of instruction
- Czech
- Follow-Up Courses
- Further Comments
- Study Materials
The course is taught annually. - Listed among pre-requisites of other courses
- Enrolment Statistics (Autumn 2022, recent)
- Permalink: https://is.muni.cz/course/fi/autumn2022/PV157