PV157 Authentication and Access Control

Faculty of Informatics
Autumn 2024
Extent and Intensity
2/0/0. 2 credit(s) (plus extra credits for completion). Recommended Type of Completion: zk (examination). Other types of completion: k (colloquium).
In-person direct teaching
Teacher(s)
prof. RNDr. Václav Matyáš, M.Sc., Ph.D. (lecturer)
Ing. Mgr. et Mgr. Zdeněk Říha, Ph.D. (assistant)
Mgr. et Mgr. Jan Krhovják, Ph.D. (assistant)
JUDr. Pavel Loutocký, Ph.D., BA (Hons) (lecturer)
RNDr. Vojtěch Suchánek (lecturer)
Guaranteed by
prof. RNDr. Václav Matyáš, M.Sc., Ph.D.
Department of Computer Systems and Communications – Faculty of Informatics
Supplier department: Department of Computer Systems and Communications – Faculty of Informatics
Timetable
Thu 26. 9. to Thu 19. 12. Thu 8:00–9:50 D3
Prerequisites
Register this course after PV080.
Course Enrolment Limitations
The course is also offered to the students of the fields other than those the course is directly associated with.
fields of study / plans the course is directly associated with
there are 39 fields of study the course is directly associated with, display
Course objectives
The course aims to advance the knowledge of PV080 graduates in the areas of authentication and access control, to teach the students to:
explain interdependencies and relations between different methods of authentication and access control;
estimate applicability of moder biometric authentication methods, their impact and practical problems;
judge methods of authentication in computer systems;
estimate pros and cons of different methods of authentication and access control;
apply different approaches to the design authentication solutions.
Learning outcomes
A graduate of this course will be able to:
explain interdependencies and relations between different methods of authentication and access control;
estimate applicability of moder biometric authentication methods, their impact and practical problems;
judge methods of authentication in computer systems;
estimate pros and cons of different methods of authentication and access control;
apply different approaches to the design authentication solutions.
Syllabus
  • Authentication of users: secret information, tokens. Introduction to biometric authentication. Frequently used biometrics. Problems of deploying biometrics. Data authentication. Electronic signature and its use. Authentication of machines and applications. Authorization and access control. Discretionary access control. Multilevel systems. Autentication and authorization techniques in current ICT systems.
Literature
    required literature
  • VAN OORSCHOT, Paul C. Computer security and the Internet : tools and jewels. Cham: Springer, 2020, xxiii, 365. ISBN 9783030336486. info
    recommended literature
  • MATYÁŠ, Václav (Vašek) and Jan KRHOVJÁK. Autorizace elektronických transakcí a autentizace dat i uživatelů (User authentication and electronic transaction authorization). 1st ed. Brno: Masarykova univerzita, 2008, 128 pp. 1. ISBN 978-80-210-4556-9. info
  • RAK, Roman, Václav MATYÁŠ, Zdeněk ŘÍHA, Viktor PORADA, Ondřej BITTO, John DAUGHMAN, Jean HENNEBERT, Danka SEIGOVÁ, Vlastimil STENZL, Jiří STRAUS, Marie SVOBODOVÁ and Halina ŠIMKOVÁ. Biometrie a identita člověka - ve forenzních a komerčních aplikacích (Biometrics and human identity - in forensic and commercial applications). Praha: Grada Publishing, a.s., 2008, 664 pp. Profesionál. ISBN 978-80-247-2365-5. URL info
Teaching methods
lectures
Assessment methods
Written final exam (about 70% of points), written mid-term exam (approx. 30% of points)
Language of instruction
Czech
Follow-Up Courses
Further Comments
Study Materials
The course is taught annually.
Listed among pre-requisites of other courses
The course is also listed under the following terms Autumn 2002, Autumn 2003, Autumn 2004, Spring 2006, Spring 2007, Spring 2008, Spring 2009, Spring 2010, Spring 2011, Spring 2012, Spring 2013, Spring 2014, Spring 2015, Spring 2016, Spring 2017, Spring 2018, Spring 2019, Spring 2020, Autumn 2021, Autumn 2022, Autumn 2023.

PV157 Authentication and Access Control

Faculty of Informatics
Autumn 2023
Extent and Intensity
2/0/0. 2 credit(s) (plus extra credits for completion). Recommended Type of Completion: zk (examination). Other types of completion: k (colloquium).
Teacher(s)
prof. RNDr. Václav Matyáš, M.Sc., Ph.D. (lecturer)
Ing. Mgr. et Mgr. Zdeněk Říha, Ph.D. (assistant)
Mgr. et Mgr. Jan Krhovják, Ph.D. (assistant)
JUDr. Pavel Loutocký, Ph.D., BA (Hons) (lecturer)
RNDr. Agáta Kružíková, Ph.D. (assistant)
Providers of Specific teaching support
Zbyněk Cincibus (přepisovatel)
Guaranteed by
prof. RNDr. Václav Matyáš, M.Sc., Ph.D.
Department of Computer Systems and Communications – Faculty of Informatics
Supplier department: Department of Computer Systems and Communications – Faculty of Informatics
Timetable
Mon 14:00–15:50 D3
Prerequisites
Register this course after PV080.
Course Enrolment Limitations
The course is also offered to the students of the fields other than those the course is directly associated with.
fields of study / plans the course is directly associated with
there are 74 fields of study the course is directly associated with, display
Course objectives
The course aims to advance the knowledge of PV080 graduates in the areas of authentication and access control, to teach the students to:
explain interdependencies and relations between different methods of authentication and access control;
estimate applicability of moder biometric authentication methods, their impact and practical problems;
judge methods of authentication in computer systems;
estimate pros and cons of different methods of authentication and access control;
apply different approaches to the design authentication solutions.
Learning outcomes
A graduate of this course will be able to:
explain interdependencies and relations between different methods of authentication and access control;
estimate applicability of moder biometric authentication methods, their impact and practical problems;
judge methods of authentication in computer systems;
estimate pros and cons of different methods of authentication and access control;
apply different approaches to the design authentication solutions.
Syllabus
  • Authentication of users: secret information, tokens. Introduction to biometric authentication. Frequently used biometrics. Problems of deploying biometrics. Data authentication. Electronic signature and its use. Authentication of machines and applications. Authorization and access control. Discretionary access control. Multilevel systems. Autentication and authorization techniques in current ICT systems.
Literature
    required literature
  • VAN OORSCHOT, Paul C. Computer security and the Internet : tools and jewels. Cham: Springer, 2020, xxiii, 365. ISBN 9783030336486. info
    recommended literature
  • MATYÁŠ, Václav (Vašek) and Jan KRHOVJÁK. Autorizace elektronických transakcí a autentizace dat i uživatelů (User authentication and electronic transaction authorization). 1st ed. Brno: Masarykova univerzita, 2008, 128 pp. 1. ISBN 978-80-210-4556-9. info
  • RAK, Roman, Václav MATYÁŠ, Zdeněk ŘÍHA, Viktor PORADA, Ondřej BITTO, John DAUGHMAN, Jean HENNEBERT, Danka SEIGOVÁ, Vlastimil STENZL, Jiří STRAUS, Marie SVOBODOVÁ and Halina ŠIMKOVÁ. Biometrie a identita člověka - ve forenzních a komerčních aplikacích (Biometrics and human identity - in forensic and commercial applications). Praha: Grada Publishing, a.s., 2008, 664 pp. Profesionál. ISBN 978-80-247-2365-5. URL info
Teaching methods
lectures
Assessment methods
Written final exam (about 70% of points), written mid-term exam (approx. 30% of points)
Language of instruction
Czech
Follow-Up Courses
Further Comments
Study Materials
The course is taught annually.
Listed among pre-requisites of other courses
The course is also listed under the following terms Autumn 2002, Autumn 2003, Autumn 2004, Spring 2006, Spring 2007, Spring 2008, Spring 2009, Spring 2010, Spring 2011, Spring 2012, Spring 2013, Spring 2014, Spring 2015, Spring 2016, Spring 2017, Spring 2018, Spring 2019, Spring 2020, Autumn 2021, Autumn 2022, Autumn 2024.

PV157 Authentication and Access Control

Faculty of Informatics
Autumn 2022
Extent and Intensity
2/0. 2 credit(s) (plus extra credits for completion). Recommended Type of Completion: zk (examination). Other types of completion: k (colloquium).
Teacher(s)
prof. RNDr. Václav Matyáš, M.Sc., Ph.D. (lecturer)
Ing. Mgr. et Mgr. Zdeněk Říha, Ph.D. (assistant)
Mgr. et Mgr. Jan Krhovják, Ph.D. (assistant)
JUDr. Pavel Loutocký, Ph.D., BA (Hons) (lecturer)
RNDr. Agáta Kružíková, Ph.D. (assistant)
Guaranteed by
prof. RNDr. Václav Matyáš, M.Sc., Ph.D.
Department of Computer Systems and Communications – Faculty of Informatics
Supplier department: Department of Computer Systems and Communications – Faculty of Informatics
Timetable
Tue 8:00–9:50 D2
Prerequisites
Register this course after PV080.
Course Enrolment Limitations
The course is also offered to the students of the fields other than those the course is directly associated with.
fields of study / plans the course is directly associated with
there are 74 fields of study the course is directly associated with, display
Course objectives
The course aims to advance the knowledge of PV080 graduates in the areas of authentication and access control, to teach the students to:
explain interdependencies and relations between different methods of authentication and access control;
estimate applicability of moder biometric authentication methods, their impact and practical problems;
judge methods of authentication in computer systems;
estimate pros and cons of different methods of authentication and access control;
apply different approaches to the design authentication solutions.
Learning outcomes
A graduate of this course will be able to:
explain interdependencies and relations between different methods of authentication and access control;
estimate applicability of moder biometric authentication methods, their impact and practical problems;
judge methods of authentication in computer systems;
estimate pros and cons of different methods of authentication and access control;
apply different approaches to the design authentication solutions.
Syllabus
  • Authentication of users: secret information, tokens. Introduction to biometric authentication. Frequently used biometrics. Problems of deploying biometrics. Data authentication. Electronic signature and its use. Authentication of machines and applications. Authorization and access control. Discretionary access control. Multilevel systems. Autentication and authorization techniques in current ICT systems.
Literature
    required literature
  • VAN OORSCHOT, Paul C. Computer security and the Internet : tools and jewels. Cham: Springer, 2020, xxiii, 365. ISBN 9783030336486. info
    recommended literature
  • MATYÁŠ, Václav (Vašek) and Jan KRHOVJÁK. Autorizace elektronických transakcí a autentizace dat i uživatelů (User authentication and electronic transaction authorization). 1st ed. Brno: Masarykova univerzita, 2008, 128 pp. 1. ISBN 978-80-210-4556-9. info
  • RAK, Roman, Václav MATYÁŠ, Zdeněk ŘÍHA, Viktor PORADA, Ondřej BITTO, John DAUGHMAN, Jean HENNEBERT, Danka SEIGOVÁ, Vlastimil STENZL, Jiří STRAUS, Marie SVOBODOVÁ and Halina ŠIMKOVÁ. Biometrie a identita člověka - ve forenzních a komerčních aplikacích (Biometrics and human identity - in forensic and commercial applications). Praha: Grada Publishing, a.s., 2008, 664 pp. Profesionál. ISBN 978-80-247-2365-5. URL info
Teaching methods
lectures
Assessment methods
Written final exam (about 70% of points), written mid-term exam (approx. 30% of points)
Language of instruction
Czech
Follow-Up Courses
Further Comments
Study Materials
The course is taught annually.
Listed among pre-requisites of other courses
The course is also listed under the following terms Autumn 2002, Autumn 2003, Autumn 2004, Spring 2006, Spring 2007, Spring 2008, Spring 2009, Spring 2010, Spring 2011, Spring 2012, Spring 2013, Spring 2014, Spring 2015, Spring 2016, Spring 2017, Spring 2018, Spring 2019, Spring 2020, Autumn 2021, Autumn 2023, Autumn 2024.

PV157 Authentication and Access Control

Faculty of Informatics
Autumn 2021
Extent and Intensity
2/0. 2 credit(s) (plus extra credits for completion). Recommended Type of Completion: zk (examination). Other types of completion: k (colloquium).
Teacher(s)
prof. RNDr. Václav Matyáš, M.Sc., Ph.D. (lecturer)
Ing. Mgr. et Mgr. Zdeněk Říha, Ph.D. (assistant)
Mgr. et Mgr. Jan Krhovják, Ph.D. (assistant)
JUDr. Pavel Loutocký, Ph.D., BA (Hons) (lecturer)
Guaranteed by
prof. RNDr. Václav Matyáš, M.Sc., Ph.D.
Department of Computer Systems and Communications – Faculty of Informatics
Supplier department: Department of Computer Systems and Communications – Faculty of Informatics
Timetable
Wed 15. 9. to Wed 8. 12. Wed 16:00–17:50 D2
Prerequisites
Register this course after PV080.
Course Enrolment Limitations
The course is also offered to the students of the fields other than those the course is directly associated with.
fields of study / plans the course is directly associated with
there are 73 fields of study the course is directly associated with, display
Course objectives
The course aims to advance the knowledge of PV080 graduates in the areas of authentication and access control, to teach the students to:
explain interdependencies and relations between different methods of authentication and access control;
estimate applicability of moder biometric authentication methods, their impact and practical problems;
judge methods of authentication in computer systems;
estimate pros and cons of different methods of authentication and access control;
apply different approaches to the design authentication solutions.
Learning outcomes
A graduate of this course will be able to:
explain interdependencies and relations between different methods of authentication and access control;
estimate applicability of moder biometric authentication methods, their impact and practical problems;
judge methods of authentication in computer systems;
estimate pros and cons of different methods of authentication and access control;
apply different approaches to the design authentication solutions.
Syllabus
  • Authentication of users: secret information, tokens. Introduction to biometric authentication. Frequently used biometrics. Problems of deploying biometrics. Data authentication. Electronic signature and its use. Authentication of machines and applications. Authorization and access control. Discretionary access control. Multilevel systems. Autentication and authorization techniques in current ICT systems.
Literature
    required literature
  • VAN OORSCHOT, Paul C. Computer security and the Internet : tools and jewels. Cham: Springer, 2020, xxiii, 365. ISBN 9783030336486. info
    recommended literature
  • MATYÁŠ, Václav (Vašek) and Jan KRHOVJÁK. Autorizace elektronických transakcí a autentizace dat i uživatelů (User authentication and electronic transaction authorization). 1st ed. Brno: Masarykova univerzita, 2008, 128 pp. 1. ISBN 978-80-210-4556-9. info
  • RAK, Roman, Václav MATYÁŠ, Zdeněk ŘÍHA, Viktor PORADA, Ondřej BITTO, John DAUGHMAN, Jean HENNEBERT, Danka SEIGOVÁ, Vlastimil STENZL, Jiří STRAUS, Marie SVOBODOVÁ and Halina ŠIMKOVÁ. Biometrie a identita člověka - ve forenzních a komerčních aplikacích (Biometrics and human identity - in forensic and commercial applications). Praha: Grada Publishing, a.s., 2008, 664 pp. Profesionál. ISBN 978-80-247-2365-5. URL info
Teaching methods
lectures
Assessment methods
Written final exam (about 70% of points), written mid-term exam (approx. 30% of points)
Language of instruction
Czech
Follow-Up Courses
Further Comments
Study Materials
The course is taught annually.
Listed among pre-requisites of other courses
The course is also listed under the following terms Autumn 2002, Autumn 2003, Autumn 2004, Spring 2006, Spring 2007, Spring 2008, Spring 2009, Spring 2010, Spring 2011, Spring 2012, Spring 2013, Spring 2014, Spring 2015, Spring 2016, Spring 2017, Spring 2018, Spring 2019, Spring 2020, Autumn 2022, Autumn 2023, Autumn 2024.

PV157 Authentication and Access Control

Faculty of Informatics
Spring 2020
Extent and Intensity
2/0. 2 credit(s) (plus extra credits for completion). Recommended Type of Completion: zk (examination). Other types of completion: k (colloquium).
Teacher(s)
prof. RNDr. Václav Matyáš, M.Sc., Ph.D. (lecturer)
RNDr. Adam Janovský (assistant)
RNDr. Dušan Klinec, Ph.D. (assistant)
Mgr. et Mgr. Jan Krhovják, Ph.D. (assistant)
RNDr. Agáta Kružíková, Ph.D. (assistant)
RNDr. Lukáš Němec, Ph.D. (assistant)
Jan Pazdziora, Ph.D. (assistant)
RNDr. Petr Ročkai, Ph.D. (assistant)
Ing. Mgr. et Mgr. Zdeněk Říha, Ph.D. (assistant)
RNDr. Vladimír Sedláček, Ph.D. (assistant)
RNDr. Martin Ukrop, Ph.D. (assistant)
Guaranteed by
prof. RNDr. Václav Matyáš, M.Sc., Ph.D.
Department of Computer Systems and Communications – Faculty of Informatics
Supplier department: Department of Computer Systems and Communications – Faculty of Informatics
Timetable
Mon 10:00–11:50 D3
Prerequisites
Register this course after PV080.
Course Enrolment Limitations
The course is also offered to the students of the fields other than those the course is directly associated with.
fields of study / plans the course is directly associated with
there are 71 fields of study the course is directly associated with, display
Course objectives
The course aims to advance the knowledge of PV080 graduates in the areas of authentication and access control, to teach the students to:
explain interdependencies and relations between different methods of authentication and access control;
estimate applicability of moder biometric authentication methods, their impact and practical problems;
judge methods of authentication in computer systems;
estimate pros and cons of different methods of authentication and access control;
apply different approaches to the design authentication solutions.
Learning outcomes
A graduate of this course will be able to:
explain interdependencies and relations between different methods of authentication and access control;
estimate applicability of moder biometric authentication methods, their impact and practical problems;
judge methods of authentication in computer systems;
estimate pros and cons of different methods of authentication and access control;
apply different approaches to the design authentication solutions.
Syllabus
  • Authentication of users: secret information, tokens. Introduction to biometric authentication. Frequently used biometrics. Problems of deploying biometrics. Data authentication. Electronic signature and its use. Authentication of machines and applications. Authorization and access control. Discretionary access control. Multilevel systems. Autentication and authorization techniques in current ICT systems.
Literature
    required literature
  • MATYÁŠ, Václav (Vašek) and Jan KRHOVJÁK. Autorizace elektronických transakcí a autentizace dat i uživatelů (User authentication and electronic transaction authorization). 1st ed. Brno: Masarykova univerzita, 2008, 128 pp. 1. ISBN 978-80-210-4556-9. info
    not specified
  • RAK, Roman, Václav MATYÁŠ, Zdeněk ŘÍHA, Viktor PORADA, Ondřej BITTO, John DAUGHMAN, Jean HENNEBERT, Danka SEIGOVÁ, Vlastimil STENZL, Jiří STRAUS, Marie SVOBODOVÁ and Halina ŠIMKOVÁ. Biometrie a identita člověka - ve forenzních a komerčních aplikacích (Biometrics and human identity - in forensic and commercial applications). Praha: Grada Publishing, a.s., 2008, 664 pp. Profesionál. ISBN 978-80-247-2365-5. URL info
Teaching methods
lectures
Assessment methods
Written final exam (about 70% of points), written mid-term exam (approx. 30% of points)
Language of instruction
Czech
Follow-Up Courses
Further Comments
Study Materials
The course is taught annually.
Listed among pre-requisites of other courses
The course is also listed under the following terms Autumn 2002, Autumn 2003, Autumn 2004, Spring 2006, Spring 2007, Spring 2008, Spring 2009, Spring 2010, Spring 2011, Spring 2012, Spring 2013, Spring 2014, Spring 2015, Spring 2016, Spring 2017, Spring 2018, Spring 2019, Autumn 2021, Autumn 2022, Autumn 2023, Autumn 2024.

PV157 Authentication and Access Control

Faculty of Informatics
Spring 2019
Extent and Intensity
2/0. 2 credit(s) (plus extra credits for completion). Recommended Type of Completion: zk (examination). Other types of completion: k (colloquium).
Teacher(s)
prof. RNDr. Václav Matyáš, M.Sc., Ph.D. (lecturer)
RNDr. Petr Ročkai, Ph.D. (lecturer)
Mgr. et Mgr. Jan Krhovják, Ph.D. (assistant)
Guaranteed by
doc. RNDr. Eva Hladká, Ph.D.
Department of Computer Systems and Communications – Faculty of Informatics
Supplier department: Department of Computer Systems and Communications – Faculty of Informatics
Timetable
Tue 19. 2. to Tue 14. 5. Tue 10:00–11:50 D3
Prerequisites
Register this course after PV080.
Course Enrolment Limitations
The course is also offered to the students of the fields other than those the course is directly associated with.
fields of study / plans the course is directly associated with
there are 34 fields of study the course is directly associated with, display
Course objectives
The course aims to advance the knowledge of PV080 graduates in the areas of authentication and access control, to teach the students to:
explain interdependencies and relations between different methods of authentication and access control;
estimate applicability of moder biometric authentication methods, their impact and practical problems;
judge methods of authentication in computer systems;
estimate pros and cons of different methods of authentication and access control;
apply different approaches to the design authentication solutions.
Learning outcomes
A graduate of this course will be able to:
explain interdependencies and relations between different methods of authentication and access control;
estimate applicability of moder biometric authentication methods, their impact and practical problems;
judge methods of authentication in computer systems;
estimate pros and cons of different methods of authentication and access control;
apply different approaches to the design authentication solutions.
Syllabus
  • Authentication of users: secret information, tokens. Introduction to biometric authentication. Frequently used biometrics. Problems of deploying biometrics. Data authentication. Electronic signature and its use. Authentication of machines and applications. Authorization and access control. Discretionary access control. Multilevel systems. Autentication and authorization techniques in current ICT systems.
Literature
    required literature
  • MATYÁŠ, Václav (Vašek) and Jan KRHOVJÁK. Autorizace elektronických transakcí a autentizace dat i uživatelů (User authentication and electronic transaction authorization). 1st ed. Brno: Masarykova univerzita, 2008, 128 pp. 1. ISBN 978-80-210-4556-9. info
    not specified
  • RAK, Roman, Václav MATYÁŠ, Zdeněk ŘÍHA, Viktor PORADA, Ondřej BITTO, John DAUGHMAN, Jean HENNEBERT, Danka SEIGOVÁ, Vlastimil STENZL, Jiří STRAUS, Marie SVOBODOVÁ and Halina ŠIMKOVÁ. Biometrie a identita člověka - ve forenzních a komerčních aplikacích (Biometrics and human identity - in forensic and commercial applications). Praha: Grada Publishing, a.s., 2008, 664 pp. Profesionál. ISBN 978-80-247-2365-5. URL info
Teaching methods
lectures
Assessment methods
Written final exam (about 70% of points), written mid-term exam (approx. 30% of points)
Language of instruction
Czech
Follow-Up Courses
Further Comments
The course is taught annually.
Listed among pre-requisites of other courses
The course is also listed under the following terms Autumn 2002, Autumn 2003, Autumn 2004, Spring 2006, Spring 2007, Spring 2008, Spring 2009, Spring 2010, Spring 2011, Spring 2012, Spring 2013, Spring 2014, Spring 2015, Spring 2016, Spring 2017, Spring 2018, Spring 2020, Autumn 2021, Autumn 2022, Autumn 2023, Autumn 2024.

PV157 Authentication and Access Control

Faculty of Informatics
Spring 2018
Extent and Intensity
2/0. 2 credit(s) (plus extra credits for completion). Recommended Type of Completion: zk (examination). Other types of completion: k (colloquium).
Teacher(s)
prof. RNDr. Václav Matyáš, M.Sc., Ph.D. (lecturer)
RNDr. Petr Ročkai, Ph.D. (lecturer)
Mgr. et Mgr. Jan Krhovják, Ph.D. (assistant)
Guaranteed by
doc. RNDr. Eva Hladká, Ph.D.
Department of Computer Systems and Communications – Faculty of Informatics
Supplier department: Department of Computer Systems and Communications – Faculty of Informatics
Timetable
Tue 10:00–11:50 D3
Prerequisites
Register this course after PV080.
Course Enrolment Limitations
The course is also offered to the students of the fields other than those the course is directly associated with.
fields of study / plans the course is directly associated with
there are 34 fields of study the course is directly associated with, display
Course objectives
The course aims to advance the knowledge of PV080 graduates in the areas of authentication and access control, to teach the students to:
explain interdependencies and relations between different methods of authentication and access control;
estimate applicability of moder biometric authentication methods, their impact and practical problems;
judge methods of authentication in computer systems;
estimate pros and cons of different methods of authentication and access control;
apply different approaches to the design authentication solutions.
Learning outcomes
A graduate of this course will be able to:
explain interdependencies and relations between different methods of authentication and access control;
estimate applicability of moder biometric authentication methods, their impact and practical problems;
judge methods of authentication in computer systems;
estimate pros and cons of different methods of authentication and access control;
apply different approaches to the design authentication solutions.
Syllabus
  • Authentication of users: secret information, tokens. Introduction to biometric authentication. Frequently used biometrics. Problems of deploying biometrics. Data authentication. Electronic signature and its use. Authentication of machines and applications. Authorization and access control. Discretionary access control. Multilevel systems. Autentication and authorization techniques in current ICT systems.
Literature
    required literature
  • MATYÁŠ, Václav (Vašek) and Jan KRHOVJÁK. Autorizace elektronických transakcí a autentizace dat i uživatelů (User authentication and electronic transaction authorization). 1st ed. Brno: Masarykova univerzita, 2008, 128 pp. 1. ISBN 978-80-210-4556-9. info
    not specified
  • RAK, Roman, Václav MATYÁŠ, Zdeněk ŘÍHA, Viktor PORADA, Ondřej BITTO, John DAUGHMAN, Jean HENNEBERT, Danka SEIGOVÁ, Vlastimil STENZL, Jiří STRAUS, Marie SVOBODOVÁ and Halina ŠIMKOVÁ. Biometrie a identita člověka - ve forenzních a komerčních aplikacích (Biometrics and human identity - in forensic and commercial applications). Praha: Grada Publishing, a.s., 2008, 664 pp. Profesionál. ISBN 978-80-247-2365-5. URL info
Teaching methods
lectures
Assessment methods
Written final exam (about 70% of points), written mid-term exam (approx. 30% of points)
Language of instruction
Czech
Follow-Up Courses
Further Comments
Study Materials
The course is taught annually.
Listed among pre-requisites of other courses
The course is also listed under the following terms Autumn 2002, Autumn 2003, Autumn 2004, Spring 2006, Spring 2007, Spring 2008, Spring 2009, Spring 2010, Spring 2011, Spring 2012, Spring 2013, Spring 2014, Spring 2015, Spring 2016, Spring 2017, Spring 2019, Spring 2020, Autumn 2021, Autumn 2022, Autumn 2023, Autumn 2024.

PV157 Authentication and Access Control

Faculty of Informatics
Spring 2017
Extent and Intensity
2/0. 2 credit(s) (plus extra credits for completion). Recommended Type of Completion: zk (examination). Other types of completion: k (colloquium).
Teacher(s)
prof. RNDr. Václav Matyáš, M.Sc., Ph.D. (lecturer)
RNDr. Petr Ročkai, Ph.D. (lecturer)
Mgr. et Mgr. Jan Krhovják, Ph.D. (assistant)
Guaranteed by
doc. RNDr. Eva Hladká, Ph.D.
Department of Computer Systems and Communications – Faculty of Informatics
Supplier department: Department of Computer Systems and Communications – Faculty of Informatics
Timetable
Mon 8:00–9:50 D3
Prerequisites
Register this course after PV080.
Course Enrolment Limitations
The course is also offered to the students of the fields other than those the course is directly associated with.
fields of study / plans the course is directly associated with
there are 34 fields of study the course is directly associated with, display
Course objectives
The course aims to advance the knowledge of PV080 graduates in the areas of authentication and access control. A graduate of this course will be able to:
explain interdependencies and relations between different methods of authentication and access control;
estimate applicability of moder biometric authentication methods, their impact and practical problems;
judge methods of authentication in computer systems;
estimate pros and cons of different methods of authentication and access control;
apply different approaches to the design authentication solutions.
Syllabus
  • Authentication of users: secret information, tokens. Introduction to biometric authentication. Frequently used biometrics. Problems of deploying biometrics. Data authentication. Electronic signature and its use. Authentication of machines and applications. Authorization and access control. Discretionary access control. Multilevel systems. Autentication and authorization techniques in current ICT systems.
Literature
    required literature
  • MATYÁŠ, Václav (Vašek) and Jan KRHOVJÁK. Autorizace elektronických transakcí a autentizace dat i uživatelů (User authentication and electronic transaction authorization). 1st ed. Brno: Masarykova univerzita, 2008, 128 pp. 1. ISBN 978-80-210-4556-9. info
    not specified
  • RAK, Roman, Václav MATYÁŠ, Zdeněk ŘÍHA, Viktor PORADA, Ondřej BITTO, John DAUGHMAN, Jean HENNEBERT, Danka SEIGOVÁ, Vlastimil STENZL, Jiří STRAUS, Marie SVOBODOVÁ and Halina ŠIMKOVÁ. Biometrie a identita člověka - ve forenzních a komerčních aplikacích (Biometrics and human identity - in forensic and commercial applications). Praha: Grada Publishing, a.s., 2008, 664 pp. Profesionál. ISBN 978-80-247-2365-5. URL info
Teaching methods
lectures
Assessment methods
Written final exam (about 70% of points), written mid-term exam (approx. 30% of points)
Language of instruction
Czech
Follow-Up Courses
Further Comments
Study Materials
The course is taught annually.
Listed among pre-requisites of other courses
The course is also listed under the following terms Autumn 2002, Autumn 2003, Autumn 2004, Spring 2006, Spring 2007, Spring 2008, Spring 2009, Spring 2010, Spring 2011, Spring 2012, Spring 2013, Spring 2014, Spring 2015, Spring 2016, Spring 2018, Spring 2019, Spring 2020, Autumn 2021, Autumn 2022, Autumn 2023, Autumn 2024.

PV157 Authentication and Access Control

Faculty of Informatics
Spring 2016
Extent and Intensity
2/0. 2 credit(s) (plus extra credits for completion). Recommended Type of Completion: zk (examination). Other types of completion: k (colloquium).
Teacher(s)
prof. RNDr. Václav Matyáš, M.Sc., Ph.D. (lecturer)
Ing. Mgr. et Mgr. Zdeněk Říha, Ph.D. (lecturer)
Mgr. et Mgr. Jan Krhovják, Ph.D. (assistant)
Guaranteed by
doc. RNDr. Eva Hladká, Ph.D.
Department of Computer Systems and Communications – Faculty of Informatics
Supplier department: Department of Computer Systems and Communications – Faculty of Informatics
Timetable
Mon 10:00–11:50 D1
Prerequisites
Register this course after PV080.
Course Enrolment Limitations
The course is also offered to the students of the fields other than those the course is directly associated with.
fields of study / plans the course is directly associated with
there are 34 fields of study the course is directly associated with, display
Course objectives
The course aims to advance the knowledge of PV080 graduates in the areas of authentication and access control. A graduate of this course will be able to:
explain interdependencies and relations between different methods of authentication and access control;
estimate applicability of moder biometric authentication methods, their impact and practical problems;
judge methods of authentication in computer systems;
estimate pros and cons of different methods of authentication and access control;
apply different approaches to the design authentication solutions.
Syllabus
  • Authentication of users: secret information, tokens. Introduction to biometric authentication. Frequently used biometrics. Problems of deploying biometrics. Data authentication. Electronic signature and its use. Authentication of machines and applications. Authorization and access control. Discretionary access control. Multilevel systems. Autentication and authorization techniques in current ICT systems.
Literature
    required literature
  • MATYÁŠ, Václav (Vašek) and Jan KRHOVJÁK. Autorizace elektronických transakcí a autentizace dat i uživatelů (User authentication and electronic transaction authorization). 1st ed. Brno: Masarykova univerzita, 2008, 128 pp. 1. ISBN 978-80-210-4556-9. info
    not specified
  • RAK, Roman, Václav MATYÁŠ, Zdeněk ŘÍHA, Viktor PORADA, Ondřej BITTO, John DAUGHMAN, Jean HENNEBERT, Danka SEIGOVÁ, Vlastimil STENZL, Jiří STRAUS, Marie SVOBODOVÁ and Halina ŠIMKOVÁ. Biometrie a identita člověka - ve forenzních a komerčních aplikacích (Biometrics and human identity - in forensic and commercial applications). Praha: Grada Publishing, a.s., 2008, 664 pp. Profesionál. ISBN 978-80-247-2365-5. URL info
Teaching methods
lectures
Assessment methods
Written final exam (about 70% of points), written mid-term exam (approx. 30% of points)
Language of instruction
Czech
Follow-Up Courses
Further Comments
Study Materials
The course is taught annually.
Listed among pre-requisites of other courses
The course is also listed under the following terms Autumn 2002, Autumn 2003, Autumn 2004, Spring 2006, Spring 2007, Spring 2008, Spring 2009, Spring 2010, Spring 2011, Spring 2012, Spring 2013, Spring 2014, Spring 2015, Spring 2017, Spring 2018, Spring 2019, Spring 2020, Autumn 2021, Autumn 2022, Autumn 2023, Autumn 2024.

PV157 Authentication and Access Control

Faculty of Informatics
Spring 2015
Extent and Intensity
2/0. 2 credit(s) (plus extra credits for completion). Recommended Type of Completion: zk (examination). Other types of completion: k (colloquium).
Teacher(s)
prof. RNDr. Václav Matyáš, M.Sc., Ph.D. (lecturer)
Ing. Mgr. et Mgr. Zdeněk Říha, Ph.D. (lecturer)
Mgr. et Mgr. Jan Krhovják, Ph.D. (assistant)
Guaranteed by
doc. RNDr. Eva Hladká, Ph.D.
Department of Computer Systems and Communications – Faculty of Informatics
Supplier department: Department of Computer Systems and Communications – Faculty of Informatics
Timetable
Mon 10:00–11:50 D3
Prerequisites
Recommended option is to register this course after PV080.
Course Enrolment Limitations
The course is also offered to the students of the fields other than those the course is directly associated with.
fields of study / plans the course is directly associated with
there are 33 fields of study the course is directly associated with, display
Course objectives
The course aims to advance the knowledge of PV080 graduates in the areas of authentication and access control. A graduate of this course will be able to:
explain interdependencies and relations between different methods of authentication and access control;
estimate applicability of moder biometric authentication methods, their impact and practical problems;
judge methods of authentication in computer systems;
estimate pros and cons of different methods of authentication and access control;
apply different approaches to the design authentication solutions.
Syllabus
  • Data authentication. Electronic signature and its use. Authentication of machines and applications. Authentication of users: secret information, tokens. Introduction to biometric authentication. Frequently used biometrics. Problems of deploying biometrics. Authorization and access control. Discretionary access control. Multilevel systems.
Literature
    required literature
  • MATYÁŠ, Václav (Vašek) and Jan KRHOVJÁK. Autorizace elektronických transakcí a autentizace dat i uživatelů (User authentication and electronic transaction authorization). 1st ed. Brno: Masarykova univerzita, 2008, 128 pp. 1. ISBN 978-80-210-4556-9. info
    not specified
  • RAK, Roman, Václav MATYÁŠ, Zdeněk ŘÍHA, Viktor PORADA, Ondřej BITTO, John DAUGHMAN, Jean HENNEBERT, Danka SEIGOVÁ, Vlastimil STENZL, Jiří STRAUS, Marie SVOBODOVÁ and Halina ŠIMKOVÁ. Biometrie a identita člověka - ve forenzních a komerčních aplikacích (Biometrics and human identity - in forensic and commercial applications). Praha: Grada Publishing, a.s., 2008, 664 pp. Profesionál. ISBN 978-80-247-2365-5. URL info
  • ANDERSON, Ross. Security engineering : a guide to building dependable distributed systems. New York: Wiley Computer Publishing, 2001, v, 612. ISBN 0471389226. URL info
Teaching methods
lectures
Assessment methods
Written final exam (about 70% of points), written mid-term exam (approx. 30% of points)
Language of instruction
Czech
Follow-Up Courses
Further Comments
The course is taught annually.
Listed among pre-requisites of other courses
The course is also listed under the following terms Autumn 2002, Autumn 2003, Autumn 2004, Spring 2006, Spring 2007, Spring 2008, Spring 2009, Spring 2010, Spring 2011, Spring 2012, Spring 2013, Spring 2014, Spring 2016, Spring 2017, Spring 2018, Spring 2019, Spring 2020, Autumn 2021, Autumn 2022, Autumn 2023, Autumn 2024.

PV157 Authentication and Access Control

Faculty of Informatics
Spring 2014
Extent and Intensity
2/0. 2 credit(s) (plus extra credits for completion). Recommended Type of Completion: zk (examination). Other types of completion: k (colloquium).
Teacher(s)
prof. RNDr. Václav Matyáš, M.Sc., Ph.D. (lecturer)
Ing. Mgr. et Mgr. Zdeněk Říha, Ph.D. (lecturer)
Mgr. et Mgr. Jan Krhovják, Ph.D. (assistant)
Guaranteed by
doc. RNDr. Vlastislav Dohnal, Ph.D.
Department of Computer Systems and Communications – Faculty of Informatics
Supplier department: Department of Computer Systems and Communications – Faculty of Informatics
Timetable
Tue 10:00–11:50 D1
Prerequisites
Recommended option is to register this course after PV080.
Course Enrolment Limitations
The course is also offered to the students of the fields other than those the course is directly associated with.
fields of study / plans the course is directly associated with
there are 33 fields of study the course is directly associated with, display
Course objectives
The course aims to advance the knowledge of PV080 graduates in the areas of authentication and access control. A graduate of this course will be able to:
explain interdependencies and relations between different methods of authentication and access control;
estimate applicability of moder biometric authentication methods, their impact and practical problems;
judge methods of authentication in computer systems;
estimate pros and cons of different methods of authentication and access control;
apply different approaches to the design authentication solutions.
Syllabus
  • Data authentication. Electronic signature and its use. Authentication of machines and applications. Authentication of users: secret information, tokens. Introduction to biometric authentication. Frequently used biometrics. Problems of deploying biometrics. Authorization and access control. Discretionary access control. Multilevel systems.
Literature
    required literature
  • MATYÁŠ, Václav (Vašek) and Jan KRHOVJÁK. Autorizace elektronických transakcí a autentizace dat i uživatelů (User authentication and electronic transaction authorization). 1st ed. Brno: Masarykova univerzita, 2008, 128 pp. 1. ISBN 978-80-210-4556-9. info
    not specified
  • RAK, Roman, Václav MATYÁŠ, Zdeněk ŘÍHA, Viktor PORADA, Ondřej BITTO, John DAUGHMAN, Jean HENNEBERT, Danka SEIGOVÁ, Vlastimil STENZL, Jiří STRAUS, Marie SVOBODOVÁ and Halina ŠIMKOVÁ. Biometrie a identita člověka - ve forenzních a komerčních aplikacích (Biometrics and human identity - in forensic and commercial applications). Praha: Grada Publishing, a.s., 2008, 664 pp. Profesionál. ISBN 978-80-247-2365-5. URL info
  • ANDERSON, Ross. Security engineering : a guide to building dependable distributed systems. New York: Wiley Computer Publishing, 2001, v, 612. ISBN 0471389226. URL info
Teaching methods
lectures
Assessment methods
Written final exam (up to 70% of points), written mid-term exam (up to 30% of points)
Language of instruction
Czech
Follow-Up Courses
Further Comments
Study Materials
The course is taught annually.
Listed among pre-requisites of other courses
The course is also listed under the following terms Autumn 2002, Autumn 2003, Autumn 2004, Spring 2006, Spring 2007, Spring 2008, Spring 2009, Spring 2010, Spring 2011, Spring 2012, Spring 2013, Spring 2015, Spring 2016, Spring 2017, Spring 2018, Spring 2019, Spring 2020, Autumn 2021, Autumn 2022, Autumn 2023, Autumn 2024.

PV157 Authentication and Access Control

Faculty of Informatics
Spring 2013
Extent and Intensity
2/0. 2 credit(s) (plus extra credits for completion). Recommended Type of Completion: zk (examination). Other types of completion: k (colloquium).
Teacher(s)
prof. RNDr. Václav Matyáš, M.Sc., Ph.D. (lecturer)
Ing. Mgr. et Mgr. Zdeněk Říha, Ph.D. (lecturer)
Mgr. et Mgr. Jan Krhovják, Ph.D. (assistant)
Guaranteed by
doc. RNDr. Vlastislav Dohnal, Ph.D.
Department of Computer Systems and Communications – Faculty of Informatics
Supplier department: Department of Computer Systems and Communications – Faculty of Informatics
Timetable
Tue 10:00–11:50 D3
Prerequisites
Recommended option is to register this course after PV080.
Course Enrolment Limitations
The course is also offered to the students of the fields other than those the course is directly associated with.
fields of study / plans the course is directly associated with
there are 33 fields of study the course is directly associated with, display
Course objectives
The course aims to advance the knowledge of PV080 graduates in the areas of authentication and access control. A graduate of this course will be able to:
explain interdependencies and relations between different methods of authentication and access control;
estimate applicability of moder biometric authentication methods, their impact and practical problems;
judge methods of authentication in computer systems;
estimate pros and cons of different methods of authentication and access control;
apply different approaches to the design authentication solutions.
Syllabus
  • Data authentication. Electronic signature and its use. Authentication of machines and applications. Authentication of users: secret information, tokens. Introduction to biometric authentication. Frequently used biometrics. Problems of deploying biometrics. Authorization and access control. Discretionary access control. Multilevel systems.
Literature
    required literature
  • MATYÁŠ, Václav (Vašek) and Jan KRHOVJÁK. Autorizace elektronických transakcí a autentizace dat i uživatelů (User authentication and electronic transaction authorization). 1st ed. Brno: Masarykova univerzita, 2008, 128 pp. 1. ISBN 978-80-210-4556-9. info
    not specified
  • RAK, Roman, Václav MATYÁŠ, Zdeněk ŘÍHA, Viktor PORADA, Ondřej BITTO, John DAUGHMAN, Jean HENNEBERT, Danka SEIGOVÁ, Vlastimil STENZL, Jiří STRAUS, Marie SVOBODOVÁ and Halina ŠIMKOVÁ. Biometrie a identita člověka - ve forenzních a komerčních aplikacích (Biometrics and human identity - in forensic and commercial applications). Praha: Grada Publishing, a.s., 2008, 664 pp. Profesionál. ISBN 978-80-247-2365-5. URL info
  • ANDERSON, Ross. Security engineering : a guide to building dependable distributed systems. New York: Wiley Computer Publishing, 2001, v, 612. ISBN 0471389226. URL info
Teaching methods
lectures
Assessment methods
Written final exam (up to 70% of points), written mid-term exam (up to 30% of points)
Language of instruction
Czech
Follow-Up Courses
Further Comments
The course is taught annually.
Listed among pre-requisites of other courses
The course is also listed under the following terms Autumn 2002, Autumn 2003, Autumn 2004, Spring 2006, Spring 2007, Spring 2008, Spring 2009, Spring 2010, Spring 2011, Spring 2012, Spring 2014, Spring 2015, Spring 2016, Spring 2017, Spring 2018, Spring 2019, Spring 2020, Autumn 2021, Autumn 2022, Autumn 2023, Autumn 2024.

PV157 Authentication and Access Control

Faculty of Informatics
Spring 2012
Extent and Intensity
2/0. 2 credit(s) (plus extra credits for completion). Recommended Type of Completion: zk (examination). Other types of completion: k (colloquium).
Teacher(s)
prof. RNDr. Václav Matyáš, M.Sc., Ph.D. (lecturer)
Ing. Mgr. et Mgr. Zdeněk Říha, Ph.D. (lecturer)
Mgr. et Mgr. Jan Krhovják, Ph.D. (assistant)
doc. RNDr. Petr Švenda, Ph.D. (assistant)
Guaranteed by
prof. RNDr. Luděk Matyska, CSc.
Department of Computer Systems and Communications – Faculty of Informatics
Supplier department: Department of Computer Systems and Communications – Faculty of Informatics
Timetable
Tue 10:00–11:50 D2
Prerequisites
Recommended option is to register this course after PV080.
Course Enrolment Limitations
The course is also offered to the students of the fields other than those the course is directly associated with.
fields of study / plans the course is directly associated with
there are 39 fields of study the course is directly associated with, display
Course objectives
The course aims to advance the knowledge of PV080 graduates in the areas of authentication and access control. A graduate of this course will be able to:
explain interdependencies and relations between different methods of authentication and access control;
estimate applicability of moder biometric authentication methods, their impact and practical problems;
judge methods of authentication in computer systems;
estimate pros and cons of different methods of authentication and access control;
apply different approaches to the design authentication solutions.
Syllabus
  • Data authentication. Electronic signature and its use. Authentication of machines and applications. Authentication of users: secret information, tokens. Introduction to biometric authentication. Frequently used biometrics. Problems of deploying biometrics. Authorization and access control. Discretionary access control. Multilevel systems.
Literature
    required literature
  • MATYÁŠ, Václav (Vašek) and Jan KRHOVJÁK. Autorizace elektronických transakcí a autentizace dat i uživatelů (User authentication and electronic transaction authorization). 1st ed. Brno: Masarykova univerzita, 2008, 128 pp. 1. ISBN 978-80-210-4556-9. info
    not specified
  • RAK, Roman, Václav MATYÁŠ, Zdeněk ŘÍHA, Viktor PORADA, Ondřej BITTO, John DAUGHMAN, Jean HENNEBERT, Danka SEIGOVÁ, Vlastimil STENZL, Jiří STRAUS, Marie SVOBODOVÁ and Halina ŠIMKOVÁ. Biometrie a identita člověka - ve forenzních a komerčních aplikacích (Biometrics and human identity - in forensic and commercial applications). Praha: Grada Publishing, a.s., 2008, 664 pp. Profesionál. ISBN 978-80-247-2365-5. URL info
  • ANDERSON, Ross. Security engineering : a guide to building dependable distributed systems. New York: Wiley Computer Publishing, 2001, v, 612. ISBN 0471389226. URL info
Teaching methods
lectures
Assessment methods
Written final exam (up to 70% of points), written mid-term exam (up to 30% of points)
Language of instruction
Czech
Follow-Up Courses
Further Comments
Study Materials
The course is taught annually.
Listed among pre-requisites of other courses
The course is also listed under the following terms Autumn 2002, Autumn 2003, Autumn 2004, Spring 2006, Spring 2007, Spring 2008, Spring 2009, Spring 2010, Spring 2011, Spring 2013, Spring 2014, Spring 2015, Spring 2016, Spring 2017, Spring 2018, Spring 2019, Spring 2020, Autumn 2021, Autumn 2022, Autumn 2023, Autumn 2024.

PV157 Authentication and Access Control

Faculty of Informatics
Spring 2011
Extent and Intensity
2/0. 2 credit(s) (plus extra credits for completion). Recommended Type of Completion: zk (examination). Other types of completion: k (colloquium).
Teacher(s)
prof. RNDr. Václav Matyáš, M.Sc., Ph.D. (lecturer)
Ing. Mgr. et Mgr. Zdeněk Říha, Ph.D. (lecturer)
Mgr. et Mgr. Jan Krhovják, Ph.D. (assistant)
Guaranteed by
prof. RNDr. Václav Matyáš, M.Sc., Ph.D.
Department of Computer Systems and Communications – Faculty of Informatics
Timetable
Tue 10:00–11:50 D3
Prerequisites
Recommended option is to register this course after PV080.
Course Enrolment Limitations
The course is also offered to the students of the fields other than those the course is directly associated with.
fields of study / plans the course is directly associated with
there are 33 fields of study the course is directly associated with, display
Course objectives
The course aims to advance the knowledge of PV080 graduates in the areas of authentication and access control. A graduate of this course will be able to:
explain interdependencies and relations between different methods of authentication and access control;
estimate applicability of moder biometric authentication methods, their impact and practical problems;
judge methods of authentication in computer systems;
estimate pros and cons of different methods of authentication and access control;
apply different approaches to the design authentication solutions.
Syllabus
  • Data authentication. Electronic signature and its use. Authentication of machines and applications. Authentication of users: secret information, tokens. Introduction to biometric authentication. Frequently used biometrics. Problems of deploying biometrics. Authorization and access control. Discretionary access control. Multilevel systems.
Literature
    required literature
  • MATYÁŠ, Václav (Vašek) and Jan KRHOVJÁK. Autorizace elektronických transakcí a autentizace dat i uživatelů (User authentication and electronic transaction authorization). 1st ed. Brno: Masarykova univerzita, 2008, 128 pp. 1. ISBN 978-80-210-4556-9. info
    not specified
  • RAK, Roman, Václav MATYÁŠ, Zdeněk ŘÍHA, Viktor PORADA, Ondřej BITTO, John DAUGHMAN, Jean HENNEBERT, Danka SEIGOVÁ, Vlastimil STENZL, Jiří STRAUS, Marie SVOBODOVÁ and Halina ŠIMKOVÁ. Biometrie a identita člověka - ve forenzních a komerčních aplikacích (Biometrics and human identity - in forensic and commercial applications). Praha: Grada Publishing, a.s., 2008, 664 pp. Profesionál. ISBN 978-80-247-2365-5. URL info
  • ANDERSON, Ross. Security engineering : a guide to building dependable distributed systems. New York: Wiley Computer Publishing, 2001, v, 612. ISBN 0471389226. URL info
Teaching methods
lectures
Assessment methods
Written final exam (up to 70% of points), written mid-term exam (up to 30% of points)
Language of instruction
Czech
Follow-Up Courses
Further Comments
Study Materials
The course is taught annually.
Listed among pre-requisites of other courses
The course is also listed under the following terms Autumn 2002, Autumn 2003, Autumn 2004, Spring 2006, Spring 2007, Spring 2008, Spring 2009, Spring 2010, Spring 2012, Spring 2013, Spring 2014, Spring 2015, Spring 2016, Spring 2017, Spring 2018, Spring 2019, Spring 2020, Autumn 2021, Autumn 2022, Autumn 2023, Autumn 2024.

PV157 Authentication and Access Control

Faculty of Informatics
Spring 2010
Extent and Intensity
2/0. 2 credit(s) (plus extra credits for completion). Recommended Type of Completion: zk (examination). Other types of completion: k (colloquium).
Teacher(s)
prof. RNDr. Václav Matyáš, M.Sc., Ph.D. (lecturer)
Ing. Mgr. et Mgr. Zdeněk Říha, Ph.D. (lecturer)
Mgr. et Mgr. Jan Krhovják, Ph.D. (assistant)
RNDr. Marek Kumpošt, Ph.D. (assistant)
doc. RNDr. Petr Švenda, Ph.D. (assistant)
Guaranteed by
prof. RNDr. Václav Matyáš, M.Sc., Ph.D.
Department of Computer Systems and Communications – Faculty of Informatics
Timetable
Tue 10:00–11:50 D3
Prerequisites
Recommended option is to register this course after PV080.
Course Enrolment Limitations
The course is also offered to the students of the fields other than those the course is directly associated with.
fields of study / plans the course is directly associated with
there are 36 fields of study the course is directly associated with, display
Course objectives
The course aims to advance the knowledge of PV080 graduates in the areas of authentication and access control. A graduate of this course will be able to:
explain interdependencies and relations between different methods of authentication and access control;
estimate applicability of moder biometric authentication methods, their impact and practical problems;
judge methods of authentication in computer systems;
estimate pros and cons of different methods of authentication and access control;
apply different approaches to the design authentication solutions.
Syllabus
  • Data authentication. Electronic signature and its use. Authentication of machines and applications. Authentication of users: secret information, tokens. Introduction to biometric authentication. Frequently used biometrics. Problems of deploying biometrics. Authorization and access control. Discretionary access control. Multilevel systems.
Literature
  • MATYÁŠ, Václav (Vašek) and Jan KRHOVJÁK. Autorizace elektronických transakcí a autentizace dat i uživatelů (User authentication and electronic transaction authorization). 1st ed. Brno: Masarykova univerzita, 2008, 128 pp. 1. ISBN 978-80-210-4556-9. info
  • BISHOP, Matt. Computer security :art and science. Boston: Addison-Wesley, 2003, xli, 1084. ISBN 0-201-44099-7. info
  • ANDERSON, Ross. Security engineering : a guide to building dependable distributed systems. New York: Wiley Computer Publishing, 2001, v, 612. ISBN 0471389226. URL info
  • MENEZES, A. J., Paul van OORSCHOT and Scott A. VANSTONE. Handbook of applied cryptography. Boca Raton: CRC Press, 1997, xiii, 780. ISBN 0-8493-8523-7. info
  • JAIN, Anil K., Ruud BOLLE and Sharath PANKANTI. Biometrics: Personal Identification in Networked Society. Norwell, Massachusetts: Kluwer Academic Publishers, 1999, 411 pp. Second printing 1999. ISBN 0-7923-8345-1. info
Teaching methods
lectures
Assessment methods
Written final exam (up to 70% of points), written mid-term exam (up to 30% of points)
Language of instruction
Czech
Follow-Up Courses
Further Comments
Study Materials
The course is taught annually.
Listed among pre-requisites of other courses
The course is also listed under the following terms Autumn 2002, Autumn 2003, Autumn 2004, Spring 2006, Spring 2007, Spring 2008, Spring 2009, Spring 2011, Spring 2012, Spring 2013, Spring 2014, Spring 2015, Spring 2016, Spring 2017, Spring 2018, Spring 2019, Spring 2020, Autumn 2021, Autumn 2022, Autumn 2023, Autumn 2024.

PV157 Authentication and Access Control

Faculty of Informatics
Spring 2009
Extent and Intensity
2/0. 2 credit(s) (plus extra credits for completion). Recommended Type of Completion: zk (examination). Other types of completion: k (colloquium).
Teacher(s)
prof. RNDr. Václav Matyáš, M.Sc., Ph.D. (lecturer)
Ing. Mgr. et Mgr. Zdeněk Říha, Ph.D. (lecturer)
Mgr. et Mgr. Jan Krhovják, Ph.D. (assistant)
RNDr. Marek Kumpošt, Ph.D. (assistant)
doc. RNDr. Petr Švenda, Ph.D. (assistant)
Guaranteed by
prof. RNDr. Václav Matyáš, M.Sc., Ph.D.
Department of Computer Systems and Communications – Faculty of Informatics
Timetable
Tue 10:00–11:50 D3
Prerequisites
Recommended option is to register this course after PV080.
Course Enrolment Limitations
The course is also offered to the students of the fields other than those the course is directly associated with.
The capacity limit for the course is 262 student(s).
Current registration and enrolment status: enrolled: 0/262, only registered: 0/262, only registered with preference (fields directly associated with the programme): 0/262
fields of study / plans the course is directly associated with
there are 33 fields of study the course is directly associated with, display
Course objectives
This course further develops the knowledge of students (namely after passing PV080) in the areas of authentication and access control. A particular attention is paid to biometric authentication methods, their use and practical problems. Students will learn about all commonly used authentication approaches (in the computer/IT environment), their pros and cons, and also about access control issues.
Syllabus
  • Data authentication. Electronic signature and its use. Authentication of machines and applications. Authentication of users: secret information, tokens. Introduction to biometric authentication. Frequently used biometrics. Problems of deploying biometrics. Authorization and access control. Discretionary access control. Multilevel systems.
Literature
  • BISHOP, Matt. Computer security :art and science. Boston: Addison-Wesley, 2003, xli, 1084. ISBN 0-201-44099-7. info
  • MENEZES, A. J., Paul van OORSCHOT and Scott A. VANSTONE. Handbook of applied cryptography. Boca Raton: CRC Press, 1997, xiii, 780. ISBN 0-8493-8523-7. info
  • ANDERSON, Ross J. Security Engineering: A Guide to Building Dependable Distributed Systems. 2001st ed. John Wiley & Sons, 2001. ISBN 0-471-38922-6. info
  • JAIN, Anil K., Ruud BOLLE and Sharath PANKANTI. Biometrics: Personal Identification in Networked Society. Norwell, Massachusetts: Kluwer Academic Publishers, 1999, 411 pp. Second printing 1999. ISBN 0-7923-8345-1. info
Assessment methods
Written final exam (up to 70% of points), written mid-term exam (up to 30% of points)
Language of instruction
Czech
Follow-Up Courses
Further Comments
The course is taught annually.
Listed among pre-requisites of other courses
The course is also listed under the following terms Autumn 2002, Autumn 2003, Autumn 2004, Spring 2006, Spring 2007, Spring 2008, Spring 2010, Spring 2011, Spring 2012, Spring 2013, Spring 2014, Spring 2015, Spring 2016, Spring 2017, Spring 2018, Spring 2019, Spring 2020, Autumn 2021, Autumn 2022, Autumn 2023, Autumn 2024.

PV157 Authentication and Access Control

Faculty of Informatics
Spring 2008
Extent and Intensity
2/0. 2 credit(s) (plus extra credits for completion). Recommended Type of Completion: zk (examination). Other types of completion: k (colloquium).
Teacher(s)
prof. RNDr. Václav Matyáš, M.Sc., Ph.D. (lecturer)
Ing. Mgr. et Mgr. Zdeněk Říha, Ph.D. (lecturer)
Mgr. et Mgr. Jan Krhovják, Ph.D. (assistant)
RNDr. Marek Kumpošt, Ph.D. (assistant)
doc. RNDr. Petr Švenda, Ph.D. (assistant)
Guaranteed by
prof. RNDr. Václav Matyáš, M.Sc., Ph.D.
Department of Computer Systems and Communications – Faculty of Informatics
Timetable
Tue 10:00–11:50 D3
Prerequisites
Recommended option is to register this course after PV080.
Course Enrolment Limitations
The course is also offered to the students of the fields other than those the course is directly associated with.
fields of study / plans the course is directly associated with
there are 37 fields of study the course is directly associated with, display
Course objectives
This course further develops the knowledge of students (namely after passing PV080) in the areas of authentication and access control. A particular attention is paid to biometric authentication methods, their use and practical problems. Students will learn about all commonly used authentication approaches (in the computer/IT environment), their pros and cons, and also about access control issues.
Syllabus
  • Data authentication. Electronic signature and its use. Authentication of machines and applications. Authentication of users: secret information, tokens. Introduction to biometric authentication. Frequently used biometrics. Problems of deploying biometrics. Authorization and access control. Discretionary access control. Multilevel systems.
Literature
  • BISHOP, Matt. Computer security :art and science. Boston: Addison-Wesley, 2003, xli, 1084. ISBN 0-201-44099-7. info
  • MENEZES, A. J., Paul van OORSCHOT and Scott A. VANSTONE. Handbook of applied cryptography. Boca Raton: CRC Press, 1997, xiii, 780. ISBN 0-8493-8523-7. info
  • ANDERSON, Ross J. Security Engineering: A Guide to Building Dependable Distributed Systems. 2001st ed. John Wiley & Sons, 2001. ISBN 0-471-38922-6. info
  • JAIN, Anil K., Ruud BOLLE and Sharath PANKANTI. Biometrics: Personal Identification in Networked Society. Norwell, Massachusetts: Kluwer Academic Publishers, 1999, 411 pp. Second printing 1999. ISBN 0-7923-8345-1. info
Assessment methods (in Czech)
Pisemna zaverecna zkouska (lze ziskat az 70 % bodu) ve zkouskovem obdobi. Polosemestralni pisemna zkouska (lze ziskat az 30 % bodu).
Language of instruction
Czech
Follow-Up Courses
Further Comments
The course is taught annually.
Listed among pre-requisites of other courses
The course is also listed under the following terms Autumn 2002, Autumn 2003, Autumn 2004, Spring 2006, Spring 2007, Spring 2009, Spring 2010, Spring 2011, Spring 2012, Spring 2013, Spring 2014, Spring 2015, Spring 2016, Spring 2017, Spring 2018, Spring 2019, Spring 2020, Autumn 2021, Autumn 2022, Autumn 2023, Autumn 2024.

PV157 Authentication and Access Control

Faculty of Informatics
Spring 2007
Extent and Intensity
2/0. 2 credit(s) (plus extra credits for completion). Recommended Type of Completion: zk (examination). Other types of completion: k (colloquium).
Teacher(s)
prof. RNDr. Václav Matyáš, M.Sc., Ph.D. (lecturer)
Ing. Mgr. et Mgr. Zdeněk Říha, Ph.D. (lecturer)
Mgr. et Mgr. Jan Krhovják, Ph.D. (assistant)
RNDr. Marek Kumpošt, Ph.D. (assistant)
doc. RNDr. Petr Švenda, Ph.D. (assistant)
Guaranteed by
prof. RNDr. Václav Matyáš, M.Sc., Ph.D.
Department of Computer Systems and Communications – Faculty of Informatics
Timetable
Tue 10:00–11:50 D1
Prerequisites
Recommended option is to register this course after PV080.
Course Enrolment Limitations
The course is also offered to the students of the fields other than those the course is directly associated with.
fields of study / plans the course is directly associated with
there are 17 fields of study the course is directly associated with, display
Course objectives
This course further develops the knowledge of students (namely after passing PV080) in the areas of authentication and access control. A particular attention is paid to biometric authentication methods, their use and practical problems. Students will learn about all commonly used authentication approaches (in the computer/IT environment), their pros and cons, and also about access control issues.
Syllabus
  • Data authentication. Electronic signature and its use. Authentication of machines and applications. Authentication of users: secret information, tokens. Introduction to biometric authentication. Frequently used biometrics. Problems of deploying biometrics. Authorization and access control. Discretionary access control. Multilevel systems.
Literature
  • BISHOP, Matt. Computer security :art and science. Boston: Addison-Wesley, 2003, xli, 1084. ISBN 0-201-44099-7. info
  • MENEZES, A. J., Paul van OORSCHOT and Scott A. VANSTONE. Handbook of applied cryptography. Boca Raton: CRC Press, 1997, xiii, 780. ISBN 0-8493-8523-7. info
  • ANDERSON, Ross J. Security Engineering: A Guide to Building Dependable Distributed Systems. 2001st ed. John Wiley & Sons, 2001. ISBN 0-471-38922-6. info
  • JAIN, Anil K., Ruud BOLLE and Sharath PANKANTI. Biometrics: Personal Identification in Networked Society. Norwell, Massachusetts: Kluwer Academic Publishers, 1999, 411 pp. Second printing 1999. ISBN 0-7923-8345-1. info
Assessment methods (in Czech)
Pisemna zaverecna zkouska (lze ziskat az 70 % bodu) ve zkouskovem obdobi. Polosemestralni pisemna zkouska (lze ziskat az 30 % bodu).
Language of instruction
Czech
Follow-Up Courses
Further Comments
Study Materials
The course is taught annually.
Listed among pre-requisites of other courses
The course is also listed under the following terms Autumn 2002, Autumn 2003, Autumn 2004, Spring 2006, Spring 2008, Spring 2009, Spring 2010, Spring 2011, Spring 2012, Spring 2013, Spring 2014, Spring 2015, Spring 2016, Spring 2017, Spring 2018, Spring 2019, Spring 2020, Autumn 2021, Autumn 2022, Autumn 2023, Autumn 2024.

PV157 Authentication and Access Control

Faculty of Informatics
Spring 2006
Extent and Intensity
2/0. 2 credit(s) (plus extra credits for completion). Recommended Type of Completion: zk (examination). Other types of completion: k (colloquium), z (credit).
Teacher(s)
prof. RNDr. Václav Matyáš, M.Sc., Ph.D. (lecturer)
Ing. Mgr. et Mgr. Zdeněk Říha, Ph.D. (lecturer)
Mgr. Vlastimil Holer (assistant)
Mgr. et Mgr. Jan Krhovják, Ph.D. (assistant)
RNDr. Marek Kumpošt, Ph.D. (assistant)
doc. RNDr. Petr Švenda, Ph.D. (assistant)
Guaranteed by
prof. RNDr. Václav Matyáš, M.Sc., Ph.D.
Department of Computer Systems and Communications – Faculty of Informatics
Timetable
Mon 14:00–15:50 D2
Prerequisites
Recommended option is to register this course after PV017.
Course Enrolment Limitations
The course is also offered to the students of the fields other than those the course is directly associated with.
fields of study / plans the course is directly associated with
there are 17 fields of study the course is directly associated with, display
Course objectives
This course further develops the knowledge of students (namely after passing PV017) in the areas of authentication and access control. A particular attention is paid to biometric authentication methods, their use and practical problems. Students will learn about all commonly used authentication approaches (in the computer/IT environment), their pros and cons, and also about access control issues.
Syllabus
  • Data authentication. Electronic signature and its use. Authentication of machines and applications. Authentication of users: secret information, tokens. Introduction to biometric authentication. Frequently used biometrics. Problems of deploying biometrics. Authorization and access control. Discretionary access control. Multilevel systems.
Literature
  • BISHOP, Matt. Computer security :art and science. Boston: Addison-Wesley, 2003, xli, 1084. ISBN 0-201-44099-7. info
  • MENEZES, A. J., Paul van OORSCHOT and Scott A. VANSTONE. Handbook of applied cryptography. Boca Raton: CRC Press, 1997, xiii, 780. ISBN 0-8493-8523-7. info
  • ANDERSON, Ross J. Security Engineering: A Guide to Building Dependable Distributed Systems. 2001st ed. John Wiley & Sons, 2001. ISBN 0-471-38922-6. info
  • JAIN, Anil K., Ruud BOLLE and Sharath PANKANTI. Biometrics: Personal Identification in Networked Society. Norwell, Massachusetts: Kluwer Academic Publishers, 1999, 411 pp. Second printing 1999. ISBN 0-7923-8345-1. info
Assessment methods (in Czech)
Pisemna zaverecna zkouska (lze ziskat az 70 % bodu) ve zkouskovem obdobi. Polosemestralni pisemna zkouska (lze ziskat az 30 % bodu).
Language of instruction
Czech
Follow-Up Courses
Further Comments
Study Materials
The course is taught annually.
Listed among pre-requisites of other courses
The course is also listed under the following terms Autumn 2002, Autumn 2003, Autumn 2004, Spring 2007, Spring 2008, Spring 2009, Spring 2010, Spring 2011, Spring 2012, Spring 2013, Spring 2014, Spring 2015, Spring 2016, Spring 2017, Spring 2018, Spring 2019, Spring 2020, Autumn 2021, Autumn 2022, Autumn 2023, Autumn 2024.

PV157 Authentication and Access Control

Faculty of Informatics
Autumn 2004
Extent and Intensity
2/0. 2 credit(s) (plus extra credits for completion). Recommended Type of Completion: zk (examination). Other types of completion: k (colloquium), z (credit).
Teacher(s)
Ing. Mgr. et Mgr. Zdeněk Říha, Ph.D. (lecturer)
prof. RNDr. Václav Matyáš, M.Sc., Ph.D. (lecturer)
Mgr. et Mgr. Jan Krhovják, Ph.D. (assistant)
RNDr. Marek Kumpošt, Ph.D. (assistant)
doc. RNDr. Petr Švenda, Ph.D. (assistant)
Guaranteed by
doc. Ing. Jan Staudek, CSc.
Department of Computer Systems and Communications – Faculty of Informatics
Timetable
Wed 18:00–19:50 D2
Prerequisites
Recommended option is to register this course after PV017.
Course Enrolment Limitations
The course is also offered to the students of the fields other than those the course is directly associated with.
fields of study / plans the course is directly associated with
there are 17 fields of study the course is directly associated with, display
Course objectives
This course further develops the knowledge of students (namely after passing PV017) in the areas of authentication and access control. A particular attention is paid to biometric authentication methods, their use and practical problems. Students will learn about all commonly used authentication approaches (in the computer/IT environment), their pros and cons, and also about access control issues.
Syllabus
  • Data authentication. Electronic signature and its use. Authentication of machines and applications. Authentication of users: secret information, tokens. Introduction to biometric authentication. Frequently used biometrics. Problems of deploying biometrics. Authorization and access control. Discretionary access control. Multilevel systems.
Literature
  • STALLINGS, William. Network security essentials :applications and standards. Upper Saddle River: Prentice Hall, 2000, xiii, 366. ISBN 0-13-016093-8. info
  • STALLINGS, William. Cryptography and network security :principles and practice. 2nd ed. Upper Saddle River: Prentice Hall, 1999, xvii, 569. ISBN 0-13-869017-0. info
Assessment methods (in Czech)
Pisemna zaverecna zkouska (lze ziskat az 70 % bodu) ve zkouskovem obdobi. Polosemestralni pisemna zkouska (lze ziskat az 30 % bodu).
Language of instruction
Czech
Follow-Up Courses
Further Comments
Study Materials
The course is taught annually.
Listed among pre-requisites of other courses
Teacher's information
http://www.fi.muni.cz/usr/matyas/lecture/pv157.html
The course is also listed under the following terms Autumn 2002, Autumn 2003, Spring 2006, Spring 2007, Spring 2008, Spring 2009, Spring 2010, Spring 2011, Spring 2012, Spring 2013, Spring 2014, Spring 2015, Spring 2016, Spring 2017, Spring 2018, Spring 2019, Spring 2020, Autumn 2021, Autumn 2022, Autumn 2023, Autumn 2024.

PV157 Authentication and Access Control

Faculty of Informatics
Autumn 2003
Extent and Intensity
2/0. 2 credit(s) (plus extra credits for completion). Recommended Type of Completion: zk (examination). Other types of completion: k (colloquium), z (credit).
Teacher(s)
Ing. Mgr. et Mgr. Zdeněk Říha, Ph.D. (lecturer)
prof. RNDr. Václav Matyáš, M.Sc., Ph.D. (lecturer)
Guaranteed by
doc. Ing. Jan Staudek, CSc.
Department of Computer Systems and Communications – Faculty of Informatics
Timetable
Thu 18:00–19:50 U5
Prerequisites
Recommended option is to register this course after PV017.
Course Enrolment Limitations
The course is also offered to the students of the fields other than those the course is directly associated with.
fields of study / plans the course is directly associated with
Course objectives (in Czech)
Předmět má za cíl prohloubit znalosti absolventů kurzu PV017 v oblasti autentizace a řízení přístupu. Zvláštní důraz bude kladen na moderní problematiku biometrických metod autentizace, jejich použití a praktické problémy. Absolventi tohoto kurzu získají dobrý přehled o používaných metodách autentizace v počítačovém prostředí, jejich výhodách a nevýhodách a také o otázkách řízení přístupu.
Syllabus
  • Data authentication. Electronic signature and its use. Authentication of machines and applications. Authentication of users: secret information, tokens. Introduction to biometric authentication. Frequently used biometrics. Problems of deploying biometrics. Authorization and access control. Discretionary access control. Multilevel systems.
Literature
  • STALLINGS, William. Network security essentials :applications and standards. Upper Saddle River: Prentice Hall, 2000, xiii, 366. ISBN 0-13-016093-8. info
  • STALLINGS, William. Cryptography and network security :principles and practice. 2nd ed. Upper Saddle River: Prentice Hall, 1999, xvii, 569. ISBN 0-13-869017-0. info
Assessment methods (in Czech)
Pisemna zaverecna zkouska (lze ziskat az 70 % bodu) ve zkouskovem obdobi. Polosemestralni pisemna zkouska (lze ziskat az 30 % bodu).
Language of instruction
Czech
Follow-Up Courses
Further Comments
The course is taught annually.
Listed among pre-requisites of other courses
Teacher's information
http://www.fi.muni.cz/usr/matyas/lecture/pv157.html
The course is also listed under the following terms Autumn 2002, Autumn 2004, Spring 2006, Spring 2007, Spring 2008, Spring 2009, Spring 2010, Spring 2011, Spring 2012, Spring 2013, Spring 2014, Spring 2015, Spring 2016, Spring 2017, Spring 2018, Spring 2019, Spring 2020, Autumn 2021, Autumn 2022, Autumn 2023, Autumn 2024.

PV157 Authentication and Access Control

Faculty of Informatics
Autumn 2002
Extent and Intensity
2/0. 2 credit(s) (plus extra credits for completion). Recommended Type of Completion: zk (examination). Other types of completion: k (colloquium), z (credit).
Teacher(s)
prof. RNDr. Václav Matyáš, M.Sc., Ph.D. (lecturer), Ing. Mgr. et Mgr. Zdeněk Říha, Ph.D. (deputy)
Ing. Mgr. et Mgr. Zdeněk Říha, Ph.D. (lecturer)
Guaranteed by
doc. Ing. Jan Staudek, CSc.
Department of Computer Systems and Communications – Faculty of Informatics
Timetable
Tue 18:00–19:50 D1
Prerequisites
Recommended option is to register this course after P017.
Course Enrolment Limitations
The course is also offered to the students of the fields other than those the course is directly associated with.
fields of study / plans the course is directly associated with
Course objectives (in Czech)
Předmět má za cíl prohloubit znalosti absolventů kurzu P017 v oblasti autentizace a řízení přístupu. Zvláštní důraz bude kladen na moderní problematiku biometrických metod autentizace, jejich použití a praktické problémy. Absolventi tohoto kurzu získají dobrý přehled o používaných metodách autentizace v počítačovém prostředí, jejich výhodách a nevýhodách a také o otázkách řízení přístupu.
Syllabus
  • Data authentication. Electronic signature and its use. Authentication of machines and applications. Authentication of users: secret information, tokens. Introduction to biometric authentication. Frequently used biometrics. Problems of deploying biometrics. Authorization and access control. Discretionary access control. Multilevel systems.
Literature
  • STALLINGS, William. Network security essentials :applications and standards. Upper Saddle River: Prentice Hall, 2000, xiii, 366. ISBN 0-13-016093-8. info
  • STALLINGS, William. Cryptography and network security :principles and practice. 2nd ed. Upper Saddle River: Prentice Hall, 1999, xvii, 569. ISBN 0-13-869017-0. info
Assessment methods (in Czech)
Písemná zkouška.
Language of instruction
Czech
Follow-Up Courses
Further Comments
The course is taught annually.
Listed among pre-requisites of other courses
The course is also listed under the following terms Autumn 2003, Autumn 2004, Spring 2006, Spring 2007, Spring 2008, Spring 2009, Spring 2010, Spring 2011, Spring 2012, Spring 2013, Spring 2014, Spring 2015, Spring 2016, Spring 2017, Spring 2018, Spring 2019, Spring 2020, Autumn 2021, Autumn 2022, Autumn 2023, Autumn 2024.

PV157 Authentication and Access Control

Faculty of Informatics
Autumn 2020

The course is not taught in Autumn 2020

Extent and Intensity
2/0. 2 credit(s) (plus extra credits for completion). Recommended Type of Completion: zk (examination). Other types of completion: k (colloquium).
Teacher(s)
prof. RNDr. Václav Matyáš, M.Sc., Ph.D. (lecturer)
RNDr. Dušan Klinec, Ph.D. (assistant)
Mgr. Lenka Knapová (assistant)
Mgr. et Mgr. Jan Krhovják, Ph.D. (assistant)
RNDr. Agáta Kružíková, Ph.D. (assistant)
RNDr. Lukáš Němec, Ph.D. (assistant)
RNDr. Petr Ročkai, Ph.D. (assistant)
Ing. Mgr. et Mgr. Zdeněk Říha, Ph.D. (assistant)
RNDr. Vladimír Sedláček, Ph.D. (assistant)
RNDr. Martin Ukrop, Ph.D. (assistant)
Guaranteed by
prof. RNDr. Václav Matyáš, M.Sc., Ph.D.
Department of Computer Systems and Communications – Faculty of Informatics
Supplier department: Department of Computer Systems and Communications – Faculty of Informatics
Prerequisites
Register this course after PV080.
Course Enrolment Limitations
The course is also offered to the students of the fields other than those the course is directly associated with.
fields of study / plans the course is directly associated with
there are 71 fields of study the course is directly associated with, display
Course objectives
The course aims to advance the knowledge of PV080 graduates in the areas of authentication and access control, to teach the students to:
explain interdependencies and relations between different methods of authentication and access control;
estimate applicability of moder biometric authentication methods, their impact and practical problems;
judge methods of authentication in computer systems;
estimate pros and cons of different methods of authentication and access control;
apply different approaches to the design authentication solutions.
Learning outcomes
A graduate of this course will be able to:
explain interdependencies and relations between different methods of authentication and access control;
estimate applicability of moder biometric authentication methods, their impact and practical problems;
judge methods of authentication in computer systems;
estimate pros and cons of different methods of authentication and access control;
apply different approaches to the design authentication solutions.
Syllabus
  • Authentication of users: secret information, tokens. Introduction to biometric authentication. Frequently used biometrics. Problems of deploying biometrics. Data authentication. Electronic signature and its use. Authentication of machines and applications. Authorization and access control. Discretionary access control. Multilevel systems. Autentication and authorization techniques in current ICT systems.
Literature
    required literature
  • MATYÁŠ, Václav (Vašek) and Jan KRHOVJÁK. Autorizace elektronických transakcí a autentizace dat i uživatelů (User authentication and electronic transaction authorization). 1st ed. Brno: Masarykova univerzita, 2008, 128 pp. 1. ISBN 978-80-210-4556-9. info
    not specified
  • RAK, Roman, Václav MATYÁŠ, Zdeněk ŘÍHA, Viktor PORADA, Ondřej BITTO, John DAUGHMAN, Jean HENNEBERT, Danka SEIGOVÁ, Vlastimil STENZL, Jiří STRAUS, Marie SVOBODOVÁ and Halina ŠIMKOVÁ. Biometrie a identita člověka - ve forenzních a komerčních aplikacích (Biometrics and human identity - in forensic and commercial applications). Praha: Grada Publishing, a.s., 2008, 664 pp. Profesionál. ISBN 978-80-247-2365-5. URL info
Teaching methods
lectures
Assessment methods
Written final exam (about 70% of points), written mid-term exam (approx. 30% of points)
Language of instruction
Czech
Follow-Up Courses
Further Comments
The course is taught annually.
The course is taught: every week.
Listed among pre-requisites of other courses
The course is also listed under the following terms Autumn 2002, Autumn 2003, Autumn 2004, Spring 2006, Spring 2007, Spring 2008, Spring 2009, Spring 2010, Spring 2011, Spring 2012, Spring 2013, Spring 2014, Spring 2015, Spring 2016, Spring 2017, Spring 2018, Spring 2019, Spring 2020, Autumn 2021, Autumn 2022, Autumn 2023, Autumn 2024.
  • Enrolment Statistics (recent)