PV157 Authentication and Access Control
Faculty of InformaticsAutumn 2024
- Extent and Intensity
- 2/0/0. 2 credit(s) (plus extra credits for completion). Recommended Type of Completion: zk (examination). Other types of completion: k (colloquium).
In-person direct teaching - Teacher(s)
- prof. RNDr. Václav Matyáš, M.Sc., Ph.D. (lecturer)
Ing. Mgr. et Mgr. Zdeněk Říha, Ph.D. (assistant)
Mgr. et Mgr. Jan Krhovják, Ph.D. (assistant)
JUDr. Pavel Loutocký, Ph.D., BA (Hons) (lecturer)
RNDr. Vojtěch Suchánek (lecturer) - Guaranteed by
- prof. RNDr. Václav Matyáš, M.Sc., Ph.D.
Department of Computer Systems and Communications – Faculty of Informatics
Supplier department: Department of Computer Systems and Communications – Faculty of Informatics - Timetable
- Thu 26. 9. to Thu 19. 12. Thu 8:00–9:50 D3
- Prerequisites
- Register this course after PV080.
- Course Enrolment Limitations
- The course is also offered to the students of the fields other than those the course is directly associated with.
- fields of study / plans the course is directly associated with
- there are 39 fields of study the course is directly associated with, display
- Course objectives
- The course aims to advance the knowledge of PV080 graduates in the areas of authentication and access control, to teach the students to:
explain interdependencies and relations between different methods of authentication and access control;
estimate applicability of moder biometric authentication methods, their impact and practical problems;
judge methods of authentication in computer systems;
estimate pros and cons of different methods of authentication and access control;
apply different approaches to the design authentication solutions. - Learning outcomes
- A graduate of this course will be able to:
explain interdependencies and relations between different methods of authentication and access control;
estimate applicability of moder biometric authentication methods, their impact and practical problems;
judge methods of authentication in computer systems;
estimate pros and cons of different methods of authentication and access control;
apply different approaches to the design authentication solutions. - Syllabus
- Authentication of users: secret information, tokens. Introduction to biometric authentication. Frequently used biometrics. Problems of deploying biometrics. Data authentication. Electronic signature and its use. Authentication of machines and applications. Authorization and access control. Discretionary access control. Multilevel systems. Autentication and authorization techniques in current ICT systems.
- Literature
- required literature
- VAN OORSCHOT, Paul C. Computer security and the Internet : tools and jewels. Cham: Springer, 2020, xxiii, 365. ISBN 9783030336486. info
- recommended literature
- MATYÁŠ, Václav (Vašek) and Jan KRHOVJÁK. Autorizace elektronických transakcí a autentizace dat i uživatelů (User authentication and electronic transaction authorization). 1st ed. Brno: Masarykova univerzita, 2008, 128 pp. 1. ISBN 978-80-210-4556-9. info
- RAK, Roman, Václav MATYÁŠ, Zdeněk ŘÍHA, Viktor PORADA, Ondřej BITTO, John DAUGHMAN, Jean HENNEBERT, Danka SEIGOVÁ, Vlastimil STENZL, Jiří STRAUS, Marie SVOBODOVÁ and Halina ŠIMKOVÁ. Biometrie a identita člověka - ve forenzních a komerčních aplikacích (Biometrics and human identity - in forensic and commercial applications). Praha: Grada Publishing, a.s., 2008, 664 pp. Profesionál. ISBN 978-80-247-2365-5. URL info
- Teaching methods
- lectures
- Assessment methods
- Written final exam (about 70% of points), written mid-term exam (approx. 30% of points)
- Language of instruction
- Czech
- Follow-Up Courses
- Further Comments
- Study Materials
The course is taught annually. - Listed among pre-requisites of other courses
PV157 Authentication and Access Control
Faculty of InformaticsAutumn 2023
- Extent and Intensity
- 2/0/0. 2 credit(s) (plus extra credits for completion). Recommended Type of Completion: zk (examination). Other types of completion: k (colloquium).
- Teacher(s)
- prof. RNDr. Václav Matyáš, M.Sc., Ph.D. (lecturer)
Ing. Mgr. et Mgr. Zdeněk Říha, Ph.D. (assistant)
Mgr. et Mgr. Jan Krhovják, Ph.D. (assistant)
JUDr. Pavel Loutocký, Ph.D., BA (Hons) (lecturer)
RNDr. Agáta Kružíková, Ph.D. (assistant) - Providers of Specific teaching support
- Zbyněk Cincibus (přepisovatel)
- Guaranteed by
- prof. RNDr. Václav Matyáš, M.Sc., Ph.D.
Department of Computer Systems and Communications – Faculty of Informatics
Supplier department: Department of Computer Systems and Communications – Faculty of Informatics - Timetable
- Mon 14:00–15:50 D3
- Prerequisites
- Register this course after PV080.
- Course Enrolment Limitations
- The course is also offered to the students of the fields other than those the course is directly associated with.
- fields of study / plans the course is directly associated with
- there are 74 fields of study the course is directly associated with, display
- Course objectives
- The course aims to advance the knowledge of PV080 graduates in the areas of authentication and access control, to teach the students to:
explain interdependencies and relations between different methods of authentication and access control;
estimate applicability of moder biometric authentication methods, their impact and practical problems;
judge methods of authentication in computer systems;
estimate pros and cons of different methods of authentication and access control;
apply different approaches to the design authentication solutions. - Learning outcomes
- A graduate of this course will be able to:
explain interdependencies and relations between different methods of authentication and access control;
estimate applicability of moder biometric authentication methods, their impact and practical problems;
judge methods of authentication in computer systems;
estimate pros and cons of different methods of authentication and access control;
apply different approaches to the design authentication solutions. - Syllabus
- Authentication of users: secret information, tokens. Introduction to biometric authentication. Frequently used biometrics. Problems of deploying biometrics. Data authentication. Electronic signature and its use. Authentication of machines and applications. Authorization and access control. Discretionary access control. Multilevel systems. Autentication and authorization techniques in current ICT systems.
- Literature
- required literature
- VAN OORSCHOT, Paul C. Computer security and the Internet : tools and jewels. Cham: Springer, 2020, xxiii, 365. ISBN 9783030336486. info
- recommended literature
- MATYÁŠ, Václav (Vašek) and Jan KRHOVJÁK. Autorizace elektronických transakcí a autentizace dat i uživatelů (User authentication and electronic transaction authorization). 1st ed. Brno: Masarykova univerzita, 2008, 128 pp. 1. ISBN 978-80-210-4556-9. info
- RAK, Roman, Václav MATYÁŠ, Zdeněk ŘÍHA, Viktor PORADA, Ondřej BITTO, John DAUGHMAN, Jean HENNEBERT, Danka SEIGOVÁ, Vlastimil STENZL, Jiří STRAUS, Marie SVOBODOVÁ and Halina ŠIMKOVÁ. Biometrie a identita člověka - ve forenzních a komerčních aplikacích (Biometrics and human identity - in forensic and commercial applications). Praha: Grada Publishing, a.s., 2008, 664 pp. Profesionál. ISBN 978-80-247-2365-5. URL info
- Teaching methods
- lectures
- Assessment methods
- Written final exam (about 70% of points), written mid-term exam (approx. 30% of points)
- Language of instruction
- Czech
- Follow-Up Courses
- Further Comments
- Study Materials
The course is taught annually. - Listed among pre-requisites of other courses
PV157 Authentication and Access Control
Faculty of InformaticsAutumn 2022
- Extent and Intensity
- 2/0. 2 credit(s) (plus extra credits for completion). Recommended Type of Completion: zk (examination). Other types of completion: k (colloquium).
- Teacher(s)
- prof. RNDr. Václav Matyáš, M.Sc., Ph.D. (lecturer)
Ing. Mgr. et Mgr. Zdeněk Říha, Ph.D. (assistant)
Mgr. et Mgr. Jan Krhovják, Ph.D. (assistant)
JUDr. Pavel Loutocký, Ph.D., BA (Hons) (lecturer)
RNDr. Agáta Kružíková, Ph.D. (assistant) - Guaranteed by
- prof. RNDr. Václav Matyáš, M.Sc., Ph.D.
Department of Computer Systems and Communications – Faculty of Informatics
Supplier department: Department of Computer Systems and Communications – Faculty of Informatics - Timetable
- Tue 8:00–9:50 D2
- Prerequisites
- Register this course after PV080.
- Course Enrolment Limitations
- The course is also offered to the students of the fields other than those the course is directly associated with.
- fields of study / plans the course is directly associated with
- there are 74 fields of study the course is directly associated with, display
- Course objectives
- The course aims to advance the knowledge of PV080 graduates in the areas of authentication and access control, to teach the students to:
explain interdependencies and relations between different methods of authentication and access control;
estimate applicability of moder biometric authentication methods, their impact and practical problems;
judge methods of authentication in computer systems;
estimate pros and cons of different methods of authentication and access control;
apply different approaches to the design authentication solutions. - Learning outcomes
- A graduate of this course will be able to:
explain interdependencies and relations between different methods of authentication and access control;
estimate applicability of moder biometric authentication methods, their impact and practical problems;
judge methods of authentication in computer systems;
estimate pros and cons of different methods of authentication and access control;
apply different approaches to the design authentication solutions. - Syllabus
- Authentication of users: secret information, tokens. Introduction to biometric authentication. Frequently used biometrics. Problems of deploying biometrics. Data authentication. Electronic signature and its use. Authentication of machines and applications. Authorization and access control. Discretionary access control. Multilevel systems. Autentication and authorization techniques in current ICT systems.
- Literature
- required literature
- VAN OORSCHOT, Paul C. Computer security and the Internet : tools and jewels. Cham: Springer, 2020, xxiii, 365. ISBN 9783030336486. info
- recommended literature
- MATYÁŠ, Václav (Vašek) and Jan KRHOVJÁK. Autorizace elektronických transakcí a autentizace dat i uživatelů (User authentication and electronic transaction authorization). 1st ed. Brno: Masarykova univerzita, 2008, 128 pp. 1. ISBN 978-80-210-4556-9. info
- RAK, Roman, Václav MATYÁŠ, Zdeněk ŘÍHA, Viktor PORADA, Ondřej BITTO, John DAUGHMAN, Jean HENNEBERT, Danka SEIGOVÁ, Vlastimil STENZL, Jiří STRAUS, Marie SVOBODOVÁ and Halina ŠIMKOVÁ. Biometrie a identita člověka - ve forenzních a komerčních aplikacích (Biometrics and human identity - in forensic and commercial applications). Praha: Grada Publishing, a.s., 2008, 664 pp. Profesionál. ISBN 978-80-247-2365-5. URL info
- Teaching methods
- lectures
- Assessment methods
- Written final exam (about 70% of points), written mid-term exam (approx. 30% of points)
- Language of instruction
- Czech
- Follow-Up Courses
- Further Comments
- Study Materials
The course is taught annually. - Listed among pre-requisites of other courses
PV157 Authentication and Access Control
Faculty of InformaticsAutumn 2021
- Extent and Intensity
- 2/0. 2 credit(s) (plus extra credits for completion). Recommended Type of Completion: zk (examination). Other types of completion: k (colloquium).
- Teacher(s)
- prof. RNDr. Václav Matyáš, M.Sc., Ph.D. (lecturer)
Ing. Mgr. et Mgr. Zdeněk Říha, Ph.D. (assistant)
Mgr. et Mgr. Jan Krhovják, Ph.D. (assistant)
JUDr. Pavel Loutocký, Ph.D., BA (Hons) (lecturer) - Guaranteed by
- prof. RNDr. Václav Matyáš, M.Sc., Ph.D.
Department of Computer Systems and Communications – Faculty of Informatics
Supplier department: Department of Computer Systems and Communications – Faculty of Informatics - Timetable
- Wed 15. 9. to Wed 8. 12. Wed 16:00–17:50 D2
- Prerequisites
- Register this course after PV080.
- Course Enrolment Limitations
- The course is also offered to the students of the fields other than those the course is directly associated with.
- fields of study / plans the course is directly associated with
- there are 73 fields of study the course is directly associated with, display
- Course objectives
- The course aims to advance the knowledge of PV080 graduates in the areas of authentication and access control, to teach the students to:
explain interdependencies and relations between different methods of authentication and access control;
estimate applicability of moder biometric authentication methods, their impact and practical problems;
judge methods of authentication in computer systems;
estimate pros and cons of different methods of authentication and access control;
apply different approaches to the design authentication solutions. - Learning outcomes
- A graduate of this course will be able to:
explain interdependencies and relations between different methods of authentication and access control;
estimate applicability of moder biometric authentication methods, their impact and practical problems;
judge methods of authentication in computer systems;
estimate pros and cons of different methods of authentication and access control;
apply different approaches to the design authentication solutions. - Syllabus
- Authentication of users: secret information, tokens. Introduction to biometric authentication. Frequently used biometrics. Problems of deploying biometrics. Data authentication. Electronic signature and its use. Authentication of machines and applications. Authorization and access control. Discretionary access control. Multilevel systems. Autentication and authorization techniques in current ICT systems.
- Literature
- required literature
- VAN OORSCHOT, Paul C. Computer security and the Internet : tools and jewels. Cham: Springer, 2020, xxiii, 365. ISBN 9783030336486. info
- recommended literature
- MATYÁŠ, Václav (Vašek) and Jan KRHOVJÁK. Autorizace elektronických transakcí a autentizace dat i uživatelů (User authentication and electronic transaction authorization). 1st ed. Brno: Masarykova univerzita, 2008, 128 pp. 1. ISBN 978-80-210-4556-9. info
- RAK, Roman, Václav MATYÁŠ, Zdeněk ŘÍHA, Viktor PORADA, Ondřej BITTO, John DAUGHMAN, Jean HENNEBERT, Danka SEIGOVÁ, Vlastimil STENZL, Jiří STRAUS, Marie SVOBODOVÁ and Halina ŠIMKOVÁ. Biometrie a identita člověka - ve forenzních a komerčních aplikacích (Biometrics and human identity - in forensic and commercial applications). Praha: Grada Publishing, a.s., 2008, 664 pp. Profesionál. ISBN 978-80-247-2365-5. URL info
- Teaching methods
- lectures
- Assessment methods
- Written final exam (about 70% of points), written mid-term exam (approx. 30% of points)
- Language of instruction
- Czech
- Follow-Up Courses
- Further Comments
- Study Materials
The course is taught annually. - Listed among pre-requisites of other courses
PV157 Authentication and Access Control
Faculty of InformaticsSpring 2020
- Extent and Intensity
- 2/0. 2 credit(s) (plus extra credits for completion). Recommended Type of Completion: zk (examination). Other types of completion: k (colloquium).
- Teacher(s)
- prof. RNDr. Václav Matyáš, M.Sc., Ph.D. (lecturer)
RNDr. Adam Janovský (assistant)
RNDr. Dušan Klinec, Ph.D. (assistant)
Mgr. et Mgr. Jan Krhovják, Ph.D. (assistant)
RNDr. Agáta Kružíková, Ph.D. (assistant)
RNDr. Lukáš Němec, Ph.D. (assistant)
Jan Pazdziora, Ph.D. (assistant)
RNDr. Petr Ročkai, Ph.D. (assistant)
Ing. Mgr. et Mgr. Zdeněk Říha, Ph.D. (assistant)
RNDr. Vladimír Sedláček, Ph.D. (assistant)
RNDr. Martin Ukrop, Ph.D. (assistant) - Guaranteed by
- prof. RNDr. Václav Matyáš, M.Sc., Ph.D.
Department of Computer Systems and Communications – Faculty of Informatics
Supplier department: Department of Computer Systems and Communications – Faculty of Informatics - Timetable
- Mon 10:00–11:50 D3
- Prerequisites
- Register this course after PV080.
- Course Enrolment Limitations
- The course is also offered to the students of the fields other than those the course is directly associated with.
- fields of study / plans the course is directly associated with
- there are 71 fields of study the course is directly associated with, display
- Course objectives
- The course aims to advance the knowledge of PV080 graduates in the areas of authentication and access control, to teach the students to:
explain interdependencies and relations between different methods of authentication and access control;
estimate applicability of moder biometric authentication methods, their impact and practical problems;
judge methods of authentication in computer systems;
estimate pros and cons of different methods of authentication and access control;
apply different approaches to the design authentication solutions. - Learning outcomes
- A graduate of this course will be able to:
explain interdependencies and relations between different methods of authentication and access control;
estimate applicability of moder biometric authentication methods, their impact and practical problems;
judge methods of authentication in computer systems;
estimate pros and cons of different methods of authentication and access control;
apply different approaches to the design authentication solutions. - Syllabus
- Authentication of users: secret information, tokens. Introduction to biometric authentication. Frequently used biometrics. Problems of deploying biometrics. Data authentication. Electronic signature and its use. Authentication of machines and applications. Authorization and access control. Discretionary access control. Multilevel systems. Autentication and authorization techniques in current ICT systems.
- Literature
- required literature
- MATYÁŠ, Václav (Vašek) and Jan KRHOVJÁK. Autorizace elektronických transakcí a autentizace dat i uživatelů (User authentication and electronic transaction authorization). 1st ed. Brno: Masarykova univerzita, 2008, 128 pp. 1. ISBN 978-80-210-4556-9. info
- not specified
- RAK, Roman, Václav MATYÁŠ, Zdeněk ŘÍHA, Viktor PORADA, Ondřej BITTO, John DAUGHMAN, Jean HENNEBERT, Danka SEIGOVÁ, Vlastimil STENZL, Jiří STRAUS, Marie SVOBODOVÁ and Halina ŠIMKOVÁ. Biometrie a identita člověka - ve forenzních a komerčních aplikacích (Biometrics and human identity - in forensic and commercial applications). Praha: Grada Publishing, a.s., 2008, 664 pp. Profesionál. ISBN 978-80-247-2365-5. URL info
- Teaching methods
- lectures
- Assessment methods
- Written final exam (about 70% of points), written mid-term exam (approx. 30% of points)
- Language of instruction
- Czech
- Follow-Up Courses
- Further Comments
- Study Materials
The course is taught annually. - Listed among pre-requisites of other courses
PV157 Authentication and Access Control
Faculty of InformaticsSpring 2019
- Extent and Intensity
- 2/0. 2 credit(s) (plus extra credits for completion). Recommended Type of Completion: zk (examination). Other types of completion: k (colloquium).
- Teacher(s)
- prof. RNDr. Václav Matyáš, M.Sc., Ph.D. (lecturer)
RNDr. Petr Ročkai, Ph.D. (lecturer)
Mgr. et Mgr. Jan Krhovják, Ph.D. (assistant) - Guaranteed by
- doc. RNDr. Eva Hladká, Ph.D.
Department of Computer Systems and Communications – Faculty of Informatics
Supplier department: Department of Computer Systems and Communications – Faculty of Informatics - Timetable
- Tue 19. 2. to Tue 14. 5. Tue 10:00–11:50 D3
- Prerequisites
- Register this course after PV080.
- Course Enrolment Limitations
- The course is also offered to the students of the fields other than those the course is directly associated with.
- fields of study / plans the course is directly associated with
- there are 34 fields of study the course is directly associated with, display
- Course objectives
- The course aims to advance the knowledge of PV080 graduates in the areas of authentication and access control, to teach the students to:
explain interdependencies and relations between different methods of authentication and access control;
estimate applicability of moder biometric authentication methods, their impact and practical problems;
judge methods of authentication in computer systems;
estimate pros and cons of different methods of authentication and access control;
apply different approaches to the design authentication solutions. - Learning outcomes
- A graduate of this course will be able to:
explain interdependencies and relations between different methods of authentication and access control;
estimate applicability of moder biometric authentication methods, their impact and practical problems;
judge methods of authentication in computer systems;
estimate pros and cons of different methods of authentication and access control;
apply different approaches to the design authentication solutions. - Syllabus
- Authentication of users: secret information, tokens. Introduction to biometric authentication. Frequently used biometrics. Problems of deploying biometrics. Data authentication. Electronic signature and its use. Authentication of machines and applications. Authorization and access control. Discretionary access control. Multilevel systems. Autentication and authorization techniques in current ICT systems.
- Literature
- required literature
- MATYÁŠ, Václav (Vašek) and Jan KRHOVJÁK. Autorizace elektronických transakcí a autentizace dat i uživatelů (User authentication and electronic transaction authorization). 1st ed. Brno: Masarykova univerzita, 2008, 128 pp. 1. ISBN 978-80-210-4556-9. info
- not specified
- RAK, Roman, Václav MATYÁŠ, Zdeněk ŘÍHA, Viktor PORADA, Ondřej BITTO, John DAUGHMAN, Jean HENNEBERT, Danka SEIGOVÁ, Vlastimil STENZL, Jiří STRAUS, Marie SVOBODOVÁ and Halina ŠIMKOVÁ. Biometrie a identita člověka - ve forenzních a komerčních aplikacích (Biometrics and human identity - in forensic and commercial applications). Praha: Grada Publishing, a.s., 2008, 664 pp. Profesionál. ISBN 978-80-247-2365-5. URL info
- Teaching methods
- lectures
- Assessment methods
- Written final exam (about 70% of points), written mid-term exam (approx. 30% of points)
- Language of instruction
- Czech
- Follow-Up Courses
- Further Comments
- The course is taught annually.
- Listed among pre-requisites of other courses
PV157 Authentication and Access Control
Faculty of InformaticsSpring 2018
- Extent and Intensity
- 2/0. 2 credit(s) (plus extra credits for completion). Recommended Type of Completion: zk (examination). Other types of completion: k (colloquium).
- Teacher(s)
- prof. RNDr. Václav Matyáš, M.Sc., Ph.D. (lecturer)
RNDr. Petr Ročkai, Ph.D. (lecturer)
Mgr. et Mgr. Jan Krhovják, Ph.D. (assistant) - Guaranteed by
- doc. RNDr. Eva Hladká, Ph.D.
Department of Computer Systems and Communications – Faculty of Informatics
Supplier department: Department of Computer Systems and Communications – Faculty of Informatics - Timetable
- Tue 10:00–11:50 D3
- Prerequisites
- Register this course after PV080.
- Course Enrolment Limitations
- The course is also offered to the students of the fields other than those the course is directly associated with.
- fields of study / plans the course is directly associated with
- there are 34 fields of study the course is directly associated with, display
- Course objectives
- The course aims to advance the knowledge of PV080 graduates in the areas of authentication and access control, to teach the students to:
explain interdependencies and relations between different methods of authentication and access control;
estimate applicability of moder biometric authentication methods, their impact and practical problems;
judge methods of authentication in computer systems;
estimate pros and cons of different methods of authentication and access control;
apply different approaches to the design authentication solutions. - Learning outcomes
- A graduate of this course will be able to:
explain interdependencies and relations between different methods of authentication and access control;
estimate applicability of moder biometric authentication methods, their impact and practical problems;
judge methods of authentication in computer systems;
estimate pros and cons of different methods of authentication and access control;
apply different approaches to the design authentication solutions. - Syllabus
- Authentication of users: secret information, tokens. Introduction to biometric authentication. Frequently used biometrics. Problems of deploying biometrics. Data authentication. Electronic signature and its use. Authentication of machines and applications. Authorization and access control. Discretionary access control. Multilevel systems. Autentication and authorization techniques in current ICT systems.
- Literature
- required literature
- MATYÁŠ, Václav (Vašek) and Jan KRHOVJÁK. Autorizace elektronických transakcí a autentizace dat i uživatelů (User authentication and electronic transaction authorization). 1st ed. Brno: Masarykova univerzita, 2008, 128 pp. 1. ISBN 978-80-210-4556-9. info
- not specified
- RAK, Roman, Václav MATYÁŠ, Zdeněk ŘÍHA, Viktor PORADA, Ondřej BITTO, John DAUGHMAN, Jean HENNEBERT, Danka SEIGOVÁ, Vlastimil STENZL, Jiří STRAUS, Marie SVOBODOVÁ and Halina ŠIMKOVÁ. Biometrie a identita člověka - ve forenzních a komerčních aplikacích (Biometrics and human identity - in forensic and commercial applications). Praha: Grada Publishing, a.s., 2008, 664 pp. Profesionál. ISBN 978-80-247-2365-5. URL info
- Teaching methods
- lectures
- Assessment methods
- Written final exam (about 70% of points), written mid-term exam (approx. 30% of points)
- Language of instruction
- Czech
- Follow-Up Courses
- Further Comments
- Study Materials
The course is taught annually. - Listed among pre-requisites of other courses
PV157 Authentication and Access Control
Faculty of InformaticsSpring 2017
- Extent and Intensity
- 2/0. 2 credit(s) (plus extra credits for completion). Recommended Type of Completion: zk (examination). Other types of completion: k (colloquium).
- Teacher(s)
- prof. RNDr. Václav Matyáš, M.Sc., Ph.D. (lecturer)
RNDr. Petr Ročkai, Ph.D. (lecturer)
Mgr. et Mgr. Jan Krhovják, Ph.D. (assistant) - Guaranteed by
- doc. RNDr. Eva Hladká, Ph.D.
Department of Computer Systems and Communications – Faculty of Informatics
Supplier department: Department of Computer Systems and Communications – Faculty of Informatics - Timetable
- Mon 8:00–9:50 D3
- Prerequisites
- Register this course after PV080.
- Course Enrolment Limitations
- The course is also offered to the students of the fields other than those the course is directly associated with.
- fields of study / plans the course is directly associated with
- there are 34 fields of study the course is directly associated with, display
- Course objectives
- The course aims to advance the knowledge of PV080 graduates in the areas of authentication and access control. A graduate of this course will be able to:
explain interdependencies and relations between different methods of authentication and access control;
estimate applicability of moder biometric authentication methods, their impact and practical problems;
judge methods of authentication in computer systems;
estimate pros and cons of different methods of authentication and access control;
apply different approaches to the design authentication solutions. - Syllabus
- Authentication of users: secret information, tokens. Introduction to biometric authentication. Frequently used biometrics. Problems of deploying biometrics. Data authentication. Electronic signature and its use. Authentication of machines and applications. Authorization and access control. Discretionary access control. Multilevel systems. Autentication and authorization techniques in current ICT systems.
- Literature
- required literature
- MATYÁŠ, Václav (Vašek) and Jan KRHOVJÁK. Autorizace elektronických transakcí a autentizace dat i uživatelů (User authentication and electronic transaction authorization). 1st ed. Brno: Masarykova univerzita, 2008, 128 pp. 1. ISBN 978-80-210-4556-9. info
- not specified
- RAK, Roman, Václav MATYÁŠ, Zdeněk ŘÍHA, Viktor PORADA, Ondřej BITTO, John DAUGHMAN, Jean HENNEBERT, Danka SEIGOVÁ, Vlastimil STENZL, Jiří STRAUS, Marie SVOBODOVÁ and Halina ŠIMKOVÁ. Biometrie a identita člověka - ve forenzních a komerčních aplikacích (Biometrics and human identity - in forensic and commercial applications). Praha: Grada Publishing, a.s., 2008, 664 pp. Profesionál. ISBN 978-80-247-2365-5. URL info
- Teaching methods
- lectures
- Assessment methods
- Written final exam (about 70% of points), written mid-term exam (approx. 30% of points)
- Language of instruction
- Czech
- Follow-Up Courses
- Further Comments
- Study Materials
The course is taught annually. - Listed among pre-requisites of other courses
PV157 Authentication and Access Control
Faculty of InformaticsSpring 2016
- Extent and Intensity
- 2/0. 2 credit(s) (plus extra credits for completion). Recommended Type of Completion: zk (examination). Other types of completion: k (colloquium).
- Teacher(s)
- prof. RNDr. Václav Matyáš, M.Sc., Ph.D. (lecturer)
Ing. Mgr. et Mgr. Zdeněk Říha, Ph.D. (lecturer)
Mgr. et Mgr. Jan Krhovják, Ph.D. (assistant) - Guaranteed by
- doc. RNDr. Eva Hladká, Ph.D.
Department of Computer Systems and Communications – Faculty of Informatics
Supplier department: Department of Computer Systems and Communications – Faculty of Informatics - Timetable
- Mon 10:00–11:50 D1
- Prerequisites
- Register this course after PV080.
- Course Enrolment Limitations
- The course is also offered to the students of the fields other than those the course is directly associated with.
- fields of study / plans the course is directly associated with
- there are 34 fields of study the course is directly associated with, display
- Course objectives
- The course aims to advance the knowledge of PV080 graduates in the areas of authentication and access control. A graduate of this course will be able to:
explain interdependencies and relations between different methods of authentication and access control;
estimate applicability of moder biometric authentication methods, their impact and practical problems;
judge methods of authentication in computer systems;
estimate pros and cons of different methods of authentication and access control;
apply different approaches to the design authentication solutions. - Syllabus
- Authentication of users: secret information, tokens. Introduction to biometric authentication. Frequently used biometrics. Problems of deploying biometrics. Data authentication. Electronic signature and its use. Authentication of machines and applications. Authorization and access control. Discretionary access control. Multilevel systems. Autentication and authorization techniques in current ICT systems.
- Literature
- required literature
- MATYÁŠ, Václav (Vašek) and Jan KRHOVJÁK. Autorizace elektronických transakcí a autentizace dat i uživatelů (User authentication and electronic transaction authorization). 1st ed. Brno: Masarykova univerzita, 2008, 128 pp. 1. ISBN 978-80-210-4556-9. info
- not specified
- RAK, Roman, Václav MATYÁŠ, Zdeněk ŘÍHA, Viktor PORADA, Ondřej BITTO, John DAUGHMAN, Jean HENNEBERT, Danka SEIGOVÁ, Vlastimil STENZL, Jiří STRAUS, Marie SVOBODOVÁ and Halina ŠIMKOVÁ. Biometrie a identita člověka - ve forenzních a komerčních aplikacích (Biometrics and human identity - in forensic and commercial applications). Praha: Grada Publishing, a.s., 2008, 664 pp. Profesionál. ISBN 978-80-247-2365-5. URL info
- Teaching methods
- lectures
- Assessment methods
- Written final exam (about 70% of points), written mid-term exam (approx. 30% of points)
- Language of instruction
- Czech
- Follow-Up Courses
- Further Comments
- Study Materials
The course is taught annually. - Listed among pre-requisites of other courses
PV157 Authentication and Access Control
Faculty of InformaticsSpring 2015
- Extent and Intensity
- 2/0. 2 credit(s) (plus extra credits for completion). Recommended Type of Completion: zk (examination). Other types of completion: k (colloquium).
- Teacher(s)
- prof. RNDr. Václav Matyáš, M.Sc., Ph.D. (lecturer)
Ing. Mgr. et Mgr. Zdeněk Říha, Ph.D. (lecturer)
Mgr. et Mgr. Jan Krhovják, Ph.D. (assistant) - Guaranteed by
- doc. RNDr. Eva Hladká, Ph.D.
Department of Computer Systems and Communications – Faculty of Informatics
Supplier department: Department of Computer Systems and Communications – Faculty of Informatics - Timetable
- Mon 10:00–11:50 D3
- Prerequisites
- Recommended option is to register this course after PV080.
- Course Enrolment Limitations
- The course is also offered to the students of the fields other than those the course is directly associated with.
- fields of study / plans the course is directly associated with
- there are 33 fields of study the course is directly associated with, display
- Course objectives
- The course aims to advance the knowledge of PV080 graduates in the areas of authentication and access control. A graduate of this course will be able to:
explain interdependencies and relations between different methods of authentication and access control;
estimate applicability of moder biometric authentication methods, their impact and practical problems;
judge methods of authentication in computer systems;
estimate pros and cons of different methods of authentication and access control;
apply different approaches to the design authentication solutions. - Syllabus
- Data authentication. Electronic signature and its use. Authentication of machines and applications. Authentication of users: secret information, tokens. Introduction to biometric authentication. Frequently used biometrics. Problems of deploying biometrics. Authorization and access control. Discretionary access control. Multilevel systems.
- Literature
- required literature
- MATYÁŠ, Václav (Vašek) and Jan KRHOVJÁK. Autorizace elektronických transakcí a autentizace dat i uživatelů (User authentication and electronic transaction authorization). 1st ed. Brno: Masarykova univerzita, 2008, 128 pp. 1. ISBN 978-80-210-4556-9. info
- not specified
- RAK, Roman, Václav MATYÁŠ, Zdeněk ŘÍHA, Viktor PORADA, Ondřej BITTO, John DAUGHMAN, Jean HENNEBERT, Danka SEIGOVÁ, Vlastimil STENZL, Jiří STRAUS, Marie SVOBODOVÁ and Halina ŠIMKOVÁ. Biometrie a identita člověka - ve forenzních a komerčních aplikacích (Biometrics and human identity - in forensic and commercial applications). Praha: Grada Publishing, a.s., 2008, 664 pp. Profesionál. ISBN 978-80-247-2365-5. URL info
- ANDERSON, Ross. Security engineering : a guide to building dependable distributed systems. New York: Wiley Computer Publishing, 2001, v, 612. ISBN 0471389226. URL info
- Teaching methods
- lectures
- Assessment methods
- Written final exam (about 70% of points), written mid-term exam (approx. 30% of points)
- Language of instruction
- Czech
- Follow-Up Courses
- Further Comments
- The course is taught annually.
- Listed among pre-requisites of other courses
PV157 Authentication and Access Control
Faculty of InformaticsSpring 2014
- Extent and Intensity
- 2/0. 2 credit(s) (plus extra credits for completion). Recommended Type of Completion: zk (examination). Other types of completion: k (colloquium).
- Teacher(s)
- prof. RNDr. Václav Matyáš, M.Sc., Ph.D. (lecturer)
Ing. Mgr. et Mgr. Zdeněk Říha, Ph.D. (lecturer)
Mgr. et Mgr. Jan Krhovják, Ph.D. (assistant) - Guaranteed by
- doc. RNDr. Vlastislav Dohnal, Ph.D.
Department of Computer Systems and Communications – Faculty of Informatics
Supplier department: Department of Computer Systems and Communications – Faculty of Informatics - Timetable
- Tue 10:00–11:50 D1
- Prerequisites
- Recommended option is to register this course after PV080.
- Course Enrolment Limitations
- The course is also offered to the students of the fields other than those the course is directly associated with.
- fields of study / plans the course is directly associated with
- there are 33 fields of study the course is directly associated with, display
- Course objectives
- The course aims to advance the knowledge of PV080 graduates in the areas of authentication and access control. A graduate of this course will be able to:
explain interdependencies and relations between different methods of authentication and access control;
estimate applicability of moder biometric authentication methods, their impact and practical problems;
judge methods of authentication in computer systems;
estimate pros and cons of different methods of authentication and access control;
apply different approaches to the design authentication solutions. - Syllabus
- Data authentication. Electronic signature and its use. Authentication of machines and applications. Authentication of users: secret information, tokens. Introduction to biometric authentication. Frequently used biometrics. Problems of deploying biometrics. Authorization and access control. Discretionary access control. Multilevel systems.
- Literature
- required literature
- MATYÁŠ, Václav (Vašek) and Jan KRHOVJÁK. Autorizace elektronických transakcí a autentizace dat i uživatelů (User authentication and electronic transaction authorization). 1st ed. Brno: Masarykova univerzita, 2008, 128 pp. 1. ISBN 978-80-210-4556-9. info
- not specified
- RAK, Roman, Václav MATYÁŠ, Zdeněk ŘÍHA, Viktor PORADA, Ondřej BITTO, John DAUGHMAN, Jean HENNEBERT, Danka SEIGOVÁ, Vlastimil STENZL, Jiří STRAUS, Marie SVOBODOVÁ and Halina ŠIMKOVÁ. Biometrie a identita člověka - ve forenzních a komerčních aplikacích (Biometrics and human identity - in forensic and commercial applications). Praha: Grada Publishing, a.s., 2008, 664 pp. Profesionál. ISBN 978-80-247-2365-5. URL info
- ANDERSON, Ross. Security engineering : a guide to building dependable distributed systems. New York: Wiley Computer Publishing, 2001, v, 612. ISBN 0471389226. URL info
- Teaching methods
- lectures
- Assessment methods
- Written final exam (up to 70% of points), written mid-term exam (up to 30% of points)
- Language of instruction
- Czech
- Follow-Up Courses
- Further Comments
- Study Materials
The course is taught annually. - Listed among pre-requisites of other courses
PV157 Authentication and Access Control
Faculty of InformaticsSpring 2013
- Extent and Intensity
- 2/0. 2 credit(s) (plus extra credits for completion). Recommended Type of Completion: zk (examination). Other types of completion: k (colloquium).
- Teacher(s)
- prof. RNDr. Václav Matyáš, M.Sc., Ph.D. (lecturer)
Ing. Mgr. et Mgr. Zdeněk Říha, Ph.D. (lecturer)
Mgr. et Mgr. Jan Krhovják, Ph.D. (assistant) - Guaranteed by
- doc. RNDr. Vlastislav Dohnal, Ph.D.
Department of Computer Systems and Communications – Faculty of Informatics
Supplier department: Department of Computer Systems and Communications – Faculty of Informatics - Timetable
- Tue 10:00–11:50 D3
- Prerequisites
- Recommended option is to register this course after PV080.
- Course Enrolment Limitations
- The course is also offered to the students of the fields other than those the course is directly associated with.
- fields of study / plans the course is directly associated with
- there are 33 fields of study the course is directly associated with, display
- Course objectives
- The course aims to advance the knowledge of PV080 graduates in the areas of authentication and access control. A graduate of this course will be able to:
explain interdependencies and relations between different methods of authentication and access control;
estimate applicability of moder biometric authentication methods, their impact and practical problems;
judge methods of authentication in computer systems;
estimate pros and cons of different methods of authentication and access control;
apply different approaches to the design authentication solutions. - Syllabus
- Data authentication. Electronic signature and its use. Authentication of machines and applications. Authentication of users: secret information, tokens. Introduction to biometric authentication. Frequently used biometrics. Problems of deploying biometrics. Authorization and access control. Discretionary access control. Multilevel systems.
- Literature
- required literature
- MATYÁŠ, Václav (Vašek) and Jan KRHOVJÁK. Autorizace elektronických transakcí a autentizace dat i uživatelů (User authentication and electronic transaction authorization). 1st ed. Brno: Masarykova univerzita, 2008, 128 pp. 1. ISBN 978-80-210-4556-9. info
- not specified
- RAK, Roman, Václav MATYÁŠ, Zdeněk ŘÍHA, Viktor PORADA, Ondřej BITTO, John DAUGHMAN, Jean HENNEBERT, Danka SEIGOVÁ, Vlastimil STENZL, Jiří STRAUS, Marie SVOBODOVÁ and Halina ŠIMKOVÁ. Biometrie a identita člověka - ve forenzních a komerčních aplikacích (Biometrics and human identity - in forensic and commercial applications). Praha: Grada Publishing, a.s., 2008, 664 pp. Profesionál. ISBN 978-80-247-2365-5. URL info
- ANDERSON, Ross. Security engineering : a guide to building dependable distributed systems. New York: Wiley Computer Publishing, 2001, v, 612. ISBN 0471389226. URL info
- Teaching methods
- lectures
- Assessment methods
- Written final exam (up to 70% of points), written mid-term exam (up to 30% of points)
- Language of instruction
- Czech
- Follow-Up Courses
- Further Comments
- The course is taught annually.
- Listed among pre-requisites of other courses
PV157 Authentication and Access Control
Faculty of InformaticsSpring 2012
- Extent and Intensity
- 2/0. 2 credit(s) (plus extra credits for completion). Recommended Type of Completion: zk (examination). Other types of completion: k (colloquium).
- Teacher(s)
- prof. RNDr. Václav Matyáš, M.Sc., Ph.D. (lecturer)
Ing. Mgr. et Mgr. Zdeněk Říha, Ph.D. (lecturer)
Mgr. et Mgr. Jan Krhovják, Ph.D. (assistant)
doc. RNDr. Petr Švenda, Ph.D. (assistant) - Guaranteed by
- prof. RNDr. Luděk Matyska, CSc.
Department of Computer Systems and Communications – Faculty of Informatics
Supplier department: Department of Computer Systems and Communications – Faculty of Informatics - Timetable
- Tue 10:00–11:50 D2
- Prerequisites
- Recommended option is to register this course after PV080.
- Course Enrolment Limitations
- The course is also offered to the students of the fields other than those the course is directly associated with.
- fields of study / plans the course is directly associated with
- there are 39 fields of study the course is directly associated with, display
- Course objectives
- The course aims to advance the knowledge of PV080 graduates in the areas of authentication and access control. A graduate of this course will be able to:
explain interdependencies and relations between different methods of authentication and access control;
estimate applicability of moder biometric authentication methods, their impact and practical problems;
judge methods of authentication in computer systems;
estimate pros and cons of different methods of authentication and access control;
apply different approaches to the design authentication solutions. - Syllabus
- Data authentication. Electronic signature and its use. Authentication of machines and applications. Authentication of users: secret information, tokens. Introduction to biometric authentication. Frequently used biometrics. Problems of deploying biometrics. Authorization and access control. Discretionary access control. Multilevel systems.
- Literature
- required literature
- MATYÁŠ, Václav (Vašek) and Jan KRHOVJÁK. Autorizace elektronických transakcí a autentizace dat i uživatelů (User authentication and electronic transaction authorization). 1st ed. Brno: Masarykova univerzita, 2008, 128 pp. 1. ISBN 978-80-210-4556-9. info
- not specified
- RAK, Roman, Václav MATYÁŠ, Zdeněk ŘÍHA, Viktor PORADA, Ondřej BITTO, John DAUGHMAN, Jean HENNEBERT, Danka SEIGOVÁ, Vlastimil STENZL, Jiří STRAUS, Marie SVOBODOVÁ and Halina ŠIMKOVÁ. Biometrie a identita člověka - ve forenzních a komerčních aplikacích (Biometrics and human identity - in forensic and commercial applications). Praha: Grada Publishing, a.s., 2008, 664 pp. Profesionál. ISBN 978-80-247-2365-5. URL info
- ANDERSON, Ross. Security engineering : a guide to building dependable distributed systems. New York: Wiley Computer Publishing, 2001, v, 612. ISBN 0471389226. URL info
- Teaching methods
- lectures
- Assessment methods
- Written final exam (up to 70% of points), written mid-term exam (up to 30% of points)
- Language of instruction
- Czech
- Follow-Up Courses
- Further Comments
- Study Materials
The course is taught annually. - Listed among pre-requisites of other courses
PV157 Authentication and Access Control
Faculty of InformaticsSpring 2011
- Extent and Intensity
- 2/0. 2 credit(s) (plus extra credits for completion). Recommended Type of Completion: zk (examination). Other types of completion: k (colloquium).
- Teacher(s)
- prof. RNDr. Václav Matyáš, M.Sc., Ph.D. (lecturer)
Ing. Mgr. et Mgr. Zdeněk Říha, Ph.D. (lecturer)
Mgr. et Mgr. Jan Krhovják, Ph.D. (assistant) - Guaranteed by
- prof. RNDr. Václav Matyáš, M.Sc., Ph.D.
Department of Computer Systems and Communications – Faculty of Informatics - Timetable
- Tue 10:00–11:50 D3
- Prerequisites
- Recommended option is to register this course after PV080.
- Course Enrolment Limitations
- The course is also offered to the students of the fields other than those the course is directly associated with.
- fields of study / plans the course is directly associated with
- there are 33 fields of study the course is directly associated with, display
- Course objectives
- The course aims to advance the knowledge of PV080 graduates in the areas of authentication and access control. A graduate of this course will be able to:
explain interdependencies and relations between different methods of authentication and access control;
estimate applicability of moder biometric authentication methods, their impact and practical problems;
judge methods of authentication in computer systems;
estimate pros and cons of different methods of authentication and access control;
apply different approaches to the design authentication solutions. - Syllabus
- Data authentication. Electronic signature and its use. Authentication of machines and applications. Authentication of users: secret information, tokens. Introduction to biometric authentication. Frequently used biometrics. Problems of deploying biometrics. Authorization and access control. Discretionary access control. Multilevel systems.
- Literature
- required literature
- MATYÁŠ, Václav (Vašek) and Jan KRHOVJÁK. Autorizace elektronických transakcí a autentizace dat i uživatelů (User authentication and electronic transaction authorization). 1st ed. Brno: Masarykova univerzita, 2008, 128 pp. 1. ISBN 978-80-210-4556-9. info
- not specified
- RAK, Roman, Václav MATYÁŠ, Zdeněk ŘÍHA, Viktor PORADA, Ondřej BITTO, John DAUGHMAN, Jean HENNEBERT, Danka SEIGOVÁ, Vlastimil STENZL, Jiří STRAUS, Marie SVOBODOVÁ and Halina ŠIMKOVÁ. Biometrie a identita člověka - ve forenzních a komerčních aplikacích (Biometrics and human identity - in forensic and commercial applications). Praha: Grada Publishing, a.s., 2008, 664 pp. Profesionál. ISBN 978-80-247-2365-5. URL info
- ANDERSON, Ross. Security engineering : a guide to building dependable distributed systems. New York: Wiley Computer Publishing, 2001, v, 612. ISBN 0471389226. URL info
- Teaching methods
- lectures
- Assessment methods
- Written final exam (up to 70% of points), written mid-term exam (up to 30% of points)
- Language of instruction
- Czech
- Follow-Up Courses
- Further Comments
- Study Materials
The course is taught annually. - Listed among pre-requisites of other courses
PV157 Authentication and Access Control
Faculty of InformaticsSpring 2010
- Extent and Intensity
- 2/0. 2 credit(s) (plus extra credits for completion). Recommended Type of Completion: zk (examination). Other types of completion: k (colloquium).
- Teacher(s)
- prof. RNDr. Václav Matyáš, M.Sc., Ph.D. (lecturer)
Ing. Mgr. et Mgr. Zdeněk Říha, Ph.D. (lecturer)
Mgr. et Mgr. Jan Krhovják, Ph.D. (assistant)
RNDr. Marek Kumpošt, Ph.D. (assistant)
doc. RNDr. Petr Švenda, Ph.D. (assistant) - Guaranteed by
- prof. RNDr. Václav Matyáš, M.Sc., Ph.D.
Department of Computer Systems and Communications – Faculty of Informatics - Timetable
- Tue 10:00–11:50 D3
- Prerequisites
- Recommended option is to register this course after PV080.
- Course Enrolment Limitations
- The course is also offered to the students of the fields other than those the course is directly associated with.
- fields of study / plans the course is directly associated with
- there are 36 fields of study the course is directly associated with, display
- Course objectives
- The course aims to advance the knowledge of PV080 graduates in the areas of authentication and access control. A graduate of this course will be able to:
explain interdependencies and relations between different methods of authentication and access control;
estimate applicability of moder biometric authentication methods, their impact and practical problems;
judge methods of authentication in computer systems;
estimate pros and cons of different methods of authentication and access control;
apply different approaches to the design authentication solutions. - Syllabus
- Data authentication. Electronic signature and its use. Authentication of machines and applications. Authentication of users: secret information, tokens. Introduction to biometric authentication. Frequently used biometrics. Problems of deploying biometrics. Authorization and access control. Discretionary access control. Multilevel systems.
- Literature
- MATYÁŠ, Václav (Vašek) and Jan KRHOVJÁK. Autorizace elektronických transakcí a autentizace dat i uživatelů (User authentication and electronic transaction authorization). 1st ed. Brno: Masarykova univerzita, 2008, 128 pp. 1. ISBN 978-80-210-4556-9. info
- BISHOP, Matt. Computer security :art and science. Boston: Addison-Wesley, 2003, xli, 1084. ISBN 0-201-44099-7. info
- ANDERSON, Ross. Security engineering : a guide to building dependable distributed systems. New York: Wiley Computer Publishing, 2001, v, 612. ISBN 0471389226. URL info
- MENEZES, A. J., Paul van OORSCHOT and Scott A. VANSTONE. Handbook of applied cryptography. Boca Raton: CRC Press, 1997, xiii, 780. ISBN 0-8493-8523-7. info
- JAIN, Anil K., Ruud BOLLE and Sharath PANKANTI. Biometrics: Personal Identification in Networked Society. Norwell, Massachusetts: Kluwer Academic Publishers, 1999, 411 pp. Second printing 1999. ISBN 0-7923-8345-1. info
- Teaching methods
- lectures
- Assessment methods
- Written final exam (up to 70% of points), written mid-term exam (up to 30% of points)
- Language of instruction
- Czech
- Follow-Up Courses
- Further Comments
- Study Materials
The course is taught annually. - Listed among pre-requisites of other courses
PV157 Authentication and Access Control
Faculty of InformaticsSpring 2009
- Extent and Intensity
- 2/0. 2 credit(s) (plus extra credits for completion). Recommended Type of Completion: zk (examination). Other types of completion: k (colloquium).
- Teacher(s)
- prof. RNDr. Václav Matyáš, M.Sc., Ph.D. (lecturer)
Ing. Mgr. et Mgr. Zdeněk Říha, Ph.D. (lecturer)
Mgr. et Mgr. Jan Krhovják, Ph.D. (assistant)
RNDr. Marek Kumpošt, Ph.D. (assistant)
doc. RNDr. Petr Švenda, Ph.D. (assistant) - Guaranteed by
- prof. RNDr. Václav Matyáš, M.Sc., Ph.D.
Department of Computer Systems and Communications – Faculty of Informatics - Timetable
- Tue 10:00–11:50 D3
- Prerequisites
- Recommended option is to register this course after PV080.
- Course Enrolment Limitations
- The course is also offered to the students of the fields other than those the course is directly associated with.
The capacity limit for the course is 262 student(s).
Current registration and enrolment status: enrolled: 0/262, only registered: 0/262, only registered with preference (fields directly associated with the programme): 0/262 - fields of study / plans the course is directly associated with
- there are 33 fields of study the course is directly associated with, display
- Course objectives
- This course further develops the knowledge of students (namely after passing PV080) in the areas of authentication and access control. A particular attention is paid to biometric authentication methods, their use and practical problems. Students will learn about all commonly used authentication approaches (in the computer/IT environment), their pros and cons, and also about access control issues.
- Syllabus
- Data authentication. Electronic signature and its use. Authentication of machines and applications. Authentication of users: secret information, tokens. Introduction to biometric authentication. Frequently used biometrics. Problems of deploying biometrics. Authorization and access control. Discretionary access control. Multilevel systems.
- Literature
- BISHOP, Matt. Computer security :art and science. Boston: Addison-Wesley, 2003, xli, 1084. ISBN 0-201-44099-7. info
- MENEZES, A. J., Paul van OORSCHOT and Scott A. VANSTONE. Handbook of applied cryptography. Boca Raton: CRC Press, 1997, xiii, 780. ISBN 0-8493-8523-7. info
- ANDERSON, Ross J. Security Engineering: A Guide to Building Dependable Distributed Systems. 2001st ed. John Wiley & Sons, 2001. ISBN 0-471-38922-6. info
- JAIN, Anil K., Ruud BOLLE and Sharath PANKANTI. Biometrics: Personal Identification in Networked Society. Norwell, Massachusetts: Kluwer Academic Publishers, 1999, 411 pp. Second printing 1999. ISBN 0-7923-8345-1. info
- Assessment methods
- Written final exam (up to 70% of points), written mid-term exam (up to 30% of points)
- Language of instruction
- Czech
- Follow-Up Courses
- Further Comments
- The course is taught annually.
- Listed among pre-requisites of other courses
PV157 Authentication and Access Control
Faculty of InformaticsSpring 2008
- Extent and Intensity
- 2/0. 2 credit(s) (plus extra credits for completion). Recommended Type of Completion: zk (examination). Other types of completion: k (colloquium).
- Teacher(s)
- prof. RNDr. Václav Matyáš, M.Sc., Ph.D. (lecturer)
Ing. Mgr. et Mgr. Zdeněk Říha, Ph.D. (lecturer)
Mgr. et Mgr. Jan Krhovják, Ph.D. (assistant)
RNDr. Marek Kumpošt, Ph.D. (assistant)
doc. RNDr. Petr Švenda, Ph.D. (assistant) - Guaranteed by
- prof. RNDr. Václav Matyáš, M.Sc., Ph.D.
Department of Computer Systems and Communications – Faculty of Informatics - Timetable
- Tue 10:00–11:50 D3
- Prerequisites
- Recommended option is to register this course after PV080.
- Course Enrolment Limitations
- The course is also offered to the students of the fields other than those the course is directly associated with.
- fields of study / plans the course is directly associated with
- there are 37 fields of study the course is directly associated with, display
- Course objectives
- This course further develops the knowledge of students (namely after passing PV080) in the areas of authentication and access control. A particular attention is paid to biometric authentication methods, their use and practical problems. Students will learn about all commonly used authentication approaches (in the computer/IT environment), their pros and cons, and also about access control issues.
- Syllabus
- Data authentication. Electronic signature and its use. Authentication of machines and applications. Authentication of users: secret information, tokens. Introduction to biometric authentication. Frequently used biometrics. Problems of deploying biometrics. Authorization and access control. Discretionary access control. Multilevel systems.
- Literature
- BISHOP, Matt. Computer security :art and science. Boston: Addison-Wesley, 2003, xli, 1084. ISBN 0-201-44099-7. info
- MENEZES, A. J., Paul van OORSCHOT and Scott A. VANSTONE. Handbook of applied cryptography. Boca Raton: CRC Press, 1997, xiii, 780. ISBN 0-8493-8523-7. info
- ANDERSON, Ross J. Security Engineering: A Guide to Building Dependable Distributed Systems. 2001st ed. John Wiley & Sons, 2001. ISBN 0-471-38922-6. info
- JAIN, Anil K., Ruud BOLLE and Sharath PANKANTI. Biometrics: Personal Identification in Networked Society. Norwell, Massachusetts: Kluwer Academic Publishers, 1999, 411 pp. Second printing 1999. ISBN 0-7923-8345-1. info
- Assessment methods (in Czech)
- Pisemna zaverecna zkouska (lze ziskat az 70 % bodu) ve zkouskovem obdobi. Polosemestralni pisemna zkouska (lze ziskat az 30 % bodu).
- Language of instruction
- Czech
- Follow-Up Courses
- Further Comments
- The course is taught annually.
- Listed among pre-requisites of other courses
PV157 Authentication and Access Control
Faculty of InformaticsSpring 2007
- Extent and Intensity
- 2/0. 2 credit(s) (plus extra credits for completion). Recommended Type of Completion: zk (examination). Other types of completion: k (colloquium).
- Teacher(s)
- prof. RNDr. Václav Matyáš, M.Sc., Ph.D. (lecturer)
Ing. Mgr. et Mgr. Zdeněk Říha, Ph.D. (lecturer)
Mgr. et Mgr. Jan Krhovják, Ph.D. (assistant)
RNDr. Marek Kumpošt, Ph.D. (assistant)
doc. RNDr. Petr Švenda, Ph.D. (assistant) - Guaranteed by
- prof. RNDr. Václav Matyáš, M.Sc., Ph.D.
Department of Computer Systems and Communications – Faculty of Informatics - Timetable
- Tue 10:00–11:50 D1
- Prerequisites
- Recommended option is to register this course after PV080.
- Course Enrolment Limitations
- The course is also offered to the students of the fields other than those the course is directly associated with.
- fields of study / plans the course is directly associated with
- there are 17 fields of study the course is directly associated with, display
- Course objectives
- This course further develops the knowledge of students (namely after passing PV080) in the areas of authentication and access control. A particular attention is paid to biometric authentication methods, their use and practical problems. Students will learn about all commonly used authentication approaches (in the computer/IT environment), their pros and cons, and also about access control issues.
- Syllabus
- Data authentication. Electronic signature and its use. Authentication of machines and applications. Authentication of users: secret information, tokens. Introduction to biometric authentication. Frequently used biometrics. Problems of deploying biometrics. Authorization and access control. Discretionary access control. Multilevel systems.
- Literature
- BISHOP, Matt. Computer security :art and science. Boston: Addison-Wesley, 2003, xli, 1084. ISBN 0-201-44099-7. info
- MENEZES, A. J., Paul van OORSCHOT and Scott A. VANSTONE. Handbook of applied cryptography. Boca Raton: CRC Press, 1997, xiii, 780. ISBN 0-8493-8523-7. info
- ANDERSON, Ross J. Security Engineering: A Guide to Building Dependable Distributed Systems. 2001st ed. John Wiley & Sons, 2001. ISBN 0-471-38922-6. info
- JAIN, Anil K., Ruud BOLLE and Sharath PANKANTI. Biometrics: Personal Identification in Networked Society. Norwell, Massachusetts: Kluwer Academic Publishers, 1999, 411 pp. Second printing 1999. ISBN 0-7923-8345-1. info
- Assessment methods (in Czech)
- Pisemna zaverecna zkouska (lze ziskat az 70 % bodu) ve zkouskovem obdobi. Polosemestralni pisemna zkouska (lze ziskat az 30 % bodu).
- Language of instruction
- Czech
- Follow-Up Courses
- Further Comments
- Study Materials
The course is taught annually. - Listed among pre-requisites of other courses
PV157 Authentication and Access Control
Faculty of InformaticsSpring 2006
- Extent and Intensity
- 2/0. 2 credit(s) (plus extra credits for completion). Recommended Type of Completion: zk (examination). Other types of completion: k (colloquium), z (credit).
- Teacher(s)
- prof. RNDr. Václav Matyáš, M.Sc., Ph.D. (lecturer)
Ing. Mgr. et Mgr. Zdeněk Říha, Ph.D. (lecturer)
Mgr. Vlastimil Holer (assistant)
Mgr. et Mgr. Jan Krhovják, Ph.D. (assistant)
RNDr. Marek Kumpošt, Ph.D. (assistant)
doc. RNDr. Petr Švenda, Ph.D. (assistant) - Guaranteed by
- prof. RNDr. Václav Matyáš, M.Sc., Ph.D.
Department of Computer Systems and Communications – Faculty of Informatics - Timetable
- Mon 14:00–15:50 D2
- Prerequisites
- Recommended option is to register this course after PV017.
- Course Enrolment Limitations
- The course is also offered to the students of the fields other than those the course is directly associated with.
- fields of study / plans the course is directly associated with
- there are 17 fields of study the course is directly associated with, display
- Course objectives
- This course further develops the knowledge of students (namely after passing PV017) in the areas of authentication and access control. A particular attention is paid to biometric authentication methods, their use and practical problems. Students will learn about all commonly used authentication approaches (in the computer/IT environment), their pros and cons, and also about access control issues.
- Syllabus
- Data authentication. Electronic signature and its use. Authentication of machines and applications. Authentication of users: secret information, tokens. Introduction to biometric authentication. Frequently used biometrics. Problems of deploying biometrics. Authorization and access control. Discretionary access control. Multilevel systems.
- Literature
- BISHOP, Matt. Computer security :art and science. Boston: Addison-Wesley, 2003, xli, 1084. ISBN 0-201-44099-7. info
- MENEZES, A. J., Paul van OORSCHOT and Scott A. VANSTONE. Handbook of applied cryptography. Boca Raton: CRC Press, 1997, xiii, 780. ISBN 0-8493-8523-7. info
- ANDERSON, Ross J. Security Engineering: A Guide to Building Dependable Distributed Systems. 2001st ed. John Wiley & Sons, 2001. ISBN 0-471-38922-6. info
- JAIN, Anil K., Ruud BOLLE and Sharath PANKANTI. Biometrics: Personal Identification in Networked Society. Norwell, Massachusetts: Kluwer Academic Publishers, 1999, 411 pp. Second printing 1999. ISBN 0-7923-8345-1. info
- Assessment methods (in Czech)
- Pisemna zaverecna zkouska (lze ziskat az 70 % bodu) ve zkouskovem obdobi. Polosemestralni pisemna zkouska (lze ziskat az 30 % bodu).
- Language of instruction
- Czech
- Follow-Up Courses
- Further Comments
- Study Materials
The course is taught annually. - Listed among pre-requisites of other courses
PV157 Authentication and Access Control
Faculty of InformaticsAutumn 2004
- Extent and Intensity
- 2/0. 2 credit(s) (plus extra credits for completion). Recommended Type of Completion: zk (examination). Other types of completion: k (colloquium), z (credit).
- Teacher(s)
- Ing. Mgr. et Mgr. Zdeněk Říha, Ph.D. (lecturer)
prof. RNDr. Václav Matyáš, M.Sc., Ph.D. (lecturer)
Mgr. et Mgr. Jan Krhovják, Ph.D. (assistant)
RNDr. Marek Kumpošt, Ph.D. (assistant)
doc. RNDr. Petr Švenda, Ph.D. (assistant) - Guaranteed by
- doc. Ing. Jan Staudek, CSc.
Department of Computer Systems and Communications – Faculty of Informatics - Timetable
- Wed 18:00–19:50 D2
- Prerequisites
- Recommended option is to register this course after PV017.
- Course Enrolment Limitations
- The course is also offered to the students of the fields other than those the course is directly associated with.
- fields of study / plans the course is directly associated with
- there are 17 fields of study the course is directly associated with, display
- Course objectives
- This course further develops the knowledge of students (namely after passing PV017) in the areas of authentication and access control. A particular attention is paid to biometric authentication methods, their use and practical problems. Students will learn about all commonly used authentication approaches (in the computer/IT environment), their pros and cons, and also about access control issues.
- Syllabus
- Data authentication. Electronic signature and its use. Authentication of machines and applications. Authentication of users: secret information, tokens. Introduction to biometric authentication. Frequently used biometrics. Problems of deploying biometrics. Authorization and access control. Discretionary access control. Multilevel systems.
- Literature
- STALLINGS, William. Network security essentials :applications and standards. Upper Saddle River: Prentice Hall, 2000, xiii, 366. ISBN 0-13-016093-8. info
- STALLINGS, William. Cryptography and network security :principles and practice. 2nd ed. Upper Saddle River: Prentice Hall, 1999, xvii, 569. ISBN 0-13-869017-0. info
- Assessment methods (in Czech)
- Pisemna zaverecna zkouska (lze ziskat az 70 % bodu) ve zkouskovem obdobi. Polosemestralni pisemna zkouska (lze ziskat az 30 % bodu).
- Language of instruction
- Czech
- Follow-Up Courses
- Further Comments
- Study Materials
The course is taught annually. - Listed among pre-requisites of other courses
- Teacher's information
- http://www.fi.muni.cz/usr/matyas/lecture/pv157.html
PV157 Authentication and Access Control
Faculty of InformaticsAutumn 2003
- Extent and Intensity
- 2/0. 2 credit(s) (plus extra credits for completion). Recommended Type of Completion: zk (examination). Other types of completion: k (colloquium), z (credit).
- Teacher(s)
- Ing. Mgr. et Mgr. Zdeněk Říha, Ph.D. (lecturer)
prof. RNDr. Václav Matyáš, M.Sc., Ph.D. (lecturer) - Guaranteed by
- doc. Ing. Jan Staudek, CSc.
Department of Computer Systems and Communications – Faculty of Informatics - Timetable
- Thu 18:00–19:50 U5
- Prerequisites
- Recommended option is to register this course after PV017.
- Course Enrolment Limitations
- The course is also offered to the students of the fields other than those the course is directly associated with.
- fields of study / plans the course is directly associated with
- Applied Informatics (programme FI, B-AP)
- Applied Informatics (programme FI, N-AP)
- Informatics (programme FI, B-IN)
- Informatics (programme FI, N-IN)
- Course objectives (in Czech)
- Předmět má za cíl prohloubit znalosti absolventů kurzu PV017 v oblasti autentizace a řízení přístupu. Zvláštní důraz bude kladen na moderní problematiku biometrických metod autentizace, jejich použití a praktické problémy. Absolventi tohoto kurzu získají dobrý přehled o používaných metodách autentizace v počítačovém prostředí, jejich výhodách a nevýhodách a také o otázkách řízení přístupu.
- Syllabus
- Data authentication. Electronic signature and its use. Authentication of machines and applications. Authentication of users: secret information, tokens. Introduction to biometric authentication. Frequently used biometrics. Problems of deploying biometrics. Authorization and access control. Discretionary access control. Multilevel systems.
- Literature
- STALLINGS, William. Network security essentials :applications and standards. Upper Saddle River: Prentice Hall, 2000, xiii, 366. ISBN 0-13-016093-8. info
- STALLINGS, William. Cryptography and network security :principles and practice. 2nd ed. Upper Saddle River: Prentice Hall, 1999, xvii, 569. ISBN 0-13-869017-0. info
- Assessment methods (in Czech)
- Pisemna zaverecna zkouska (lze ziskat az 70 % bodu) ve zkouskovem obdobi. Polosemestralni pisemna zkouska (lze ziskat az 30 % bodu).
- Language of instruction
- Czech
- Follow-Up Courses
- Further Comments
- The course is taught annually.
- Listed among pre-requisites of other courses
- Teacher's information
- http://www.fi.muni.cz/usr/matyas/lecture/pv157.html
PV157 Authentication and Access Control
Faculty of InformaticsAutumn 2002
- Extent and Intensity
- 2/0. 2 credit(s) (plus extra credits for completion). Recommended Type of Completion: zk (examination). Other types of completion: k (colloquium), z (credit).
- Teacher(s)
- prof. RNDr. Václav Matyáš, M.Sc., Ph.D. (lecturer), Ing. Mgr. et Mgr. Zdeněk Říha, Ph.D. (deputy)
Ing. Mgr. et Mgr. Zdeněk Říha, Ph.D. (lecturer) - Guaranteed by
- doc. Ing. Jan Staudek, CSc.
Department of Computer Systems and Communications – Faculty of Informatics - Timetable
- Tue 18:00–19:50 D1
- Prerequisites
- Recommended option is to register this course after P017.
- Course Enrolment Limitations
- The course is also offered to the students of the fields other than those the course is directly associated with.
- fields of study / plans the course is directly associated with
- Applied Informatics (programme FI, B-AP)
- Applied Informatics (programme FI, N-AP)
- Informatics (programme FI, B-IN)
- Informatics (programme FI, N-IN)
- Course objectives (in Czech)
- Předmět má za cíl prohloubit znalosti absolventů kurzu P017 v oblasti autentizace a řízení přístupu. Zvláštní důraz bude kladen na moderní problematiku biometrických metod autentizace, jejich použití a praktické problémy. Absolventi tohoto kurzu získají dobrý přehled o používaných metodách autentizace v počítačovém prostředí, jejich výhodách a nevýhodách a také o otázkách řízení přístupu.
- Syllabus
- Data authentication. Electronic signature and its use. Authentication of machines and applications. Authentication of users: secret information, tokens. Introduction to biometric authentication. Frequently used biometrics. Problems of deploying biometrics. Authorization and access control. Discretionary access control. Multilevel systems.
- Literature
- STALLINGS, William. Network security essentials :applications and standards. Upper Saddle River: Prentice Hall, 2000, xiii, 366. ISBN 0-13-016093-8. info
- STALLINGS, William. Cryptography and network security :principles and practice. 2nd ed. Upper Saddle River: Prentice Hall, 1999, xvii, 569. ISBN 0-13-869017-0. info
- Assessment methods (in Czech)
- Písemná zkouška.
- Language of instruction
- Czech
- Follow-Up Courses
- Further Comments
- The course is taught annually.
- Listed among pre-requisites of other courses
PV157 Authentication and Access Control
Faculty of InformaticsAutumn 2020
The course is not taught in Autumn 2020
- Extent and Intensity
- 2/0. 2 credit(s) (plus extra credits for completion). Recommended Type of Completion: zk (examination). Other types of completion: k (colloquium).
- Teacher(s)
- prof. RNDr. Václav Matyáš, M.Sc., Ph.D. (lecturer)
RNDr. Dušan Klinec, Ph.D. (assistant)
Mgr. Lenka Knapová (assistant)
Mgr. et Mgr. Jan Krhovják, Ph.D. (assistant)
RNDr. Agáta Kružíková, Ph.D. (assistant)
RNDr. Lukáš Němec, Ph.D. (assistant)
RNDr. Petr Ročkai, Ph.D. (assistant)
Ing. Mgr. et Mgr. Zdeněk Říha, Ph.D. (assistant)
RNDr. Vladimír Sedláček, Ph.D. (assistant)
RNDr. Martin Ukrop, Ph.D. (assistant) - Guaranteed by
- prof. RNDr. Václav Matyáš, M.Sc., Ph.D.
Department of Computer Systems and Communications – Faculty of Informatics
Supplier department: Department of Computer Systems and Communications – Faculty of Informatics - Prerequisites
- Register this course after PV080.
- Course Enrolment Limitations
- The course is also offered to the students of the fields other than those the course is directly associated with.
- fields of study / plans the course is directly associated with
- there are 71 fields of study the course is directly associated with, display
- Course objectives
- The course aims to advance the knowledge of PV080 graduates in the areas of authentication and access control, to teach the students to:
explain interdependencies and relations between different methods of authentication and access control;
estimate applicability of moder biometric authentication methods, their impact and practical problems;
judge methods of authentication in computer systems;
estimate pros and cons of different methods of authentication and access control;
apply different approaches to the design authentication solutions. - Learning outcomes
- A graduate of this course will be able to:
explain interdependencies and relations between different methods of authentication and access control;
estimate applicability of moder biometric authentication methods, their impact and practical problems;
judge methods of authentication in computer systems;
estimate pros and cons of different methods of authentication and access control;
apply different approaches to the design authentication solutions. - Syllabus
- Authentication of users: secret information, tokens. Introduction to biometric authentication. Frequently used biometrics. Problems of deploying biometrics. Data authentication. Electronic signature and its use. Authentication of machines and applications. Authorization and access control. Discretionary access control. Multilevel systems. Autentication and authorization techniques in current ICT systems.
- Literature
- required literature
- MATYÁŠ, Václav (Vašek) and Jan KRHOVJÁK. Autorizace elektronických transakcí a autentizace dat i uživatelů (User authentication and electronic transaction authorization). 1st ed. Brno: Masarykova univerzita, 2008, 128 pp. 1. ISBN 978-80-210-4556-9. info
- not specified
- RAK, Roman, Václav MATYÁŠ, Zdeněk ŘÍHA, Viktor PORADA, Ondřej BITTO, John DAUGHMAN, Jean HENNEBERT, Danka SEIGOVÁ, Vlastimil STENZL, Jiří STRAUS, Marie SVOBODOVÁ and Halina ŠIMKOVÁ. Biometrie a identita člověka - ve forenzních a komerčních aplikacích (Biometrics and human identity - in forensic and commercial applications). Praha: Grada Publishing, a.s., 2008, 664 pp. Profesionál. ISBN 978-80-247-2365-5. URL info
- Teaching methods
- lectures
- Assessment methods
- Written final exam (about 70% of points), written mid-term exam (approx. 30% of points)
- Language of instruction
- Czech
- Follow-Up Courses
- Further Comments
- The course is taught annually.
The course is taught: every week. - Listed among pre-requisites of other courses
- Enrolment Statistics (recent)