FI:PV157 Authentication and AC - Course Information
PV157 Authentication and Access Control
Faculty of InformaticsSpring 2008
- Extent and Intensity
- 2/0. 2 credit(s) (plus extra credits for completion). Recommended Type of Completion: zk (examination). Other types of completion: k (colloquium).
- Teacher(s)
- prof. RNDr. Václav Matyáš, M.Sc., Ph.D. (lecturer)
Ing. Mgr. et Mgr. Zdeněk Říha, Ph.D. (lecturer)
Mgr. et Mgr. Jan Krhovják, Ph.D. (assistant)
RNDr. Marek Kumpošt, Ph.D. (assistant)
doc. RNDr. Petr Švenda, Ph.D. (assistant) - Guaranteed by
- prof. RNDr. Václav Matyáš, M.Sc., Ph.D.
Department of Computer Systems and Communications – Faculty of Informatics - Timetable
- Tue 10:00–11:50 D3
- Prerequisites
- Recommended option is to register this course after PV080.
- Course Enrolment Limitations
- The course is also offered to the students of the fields other than those the course is directly associated with.
- fields of study / plans the course is directly associated with
- there are 37 fields of study the course is directly associated with, display
- Course objectives
- This course further develops the knowledge of students (namely after passing PV080) in the areas of authentication and access control. A particular attention is paid to biometric authentication methods, their use and practical problems. Students will learn about all commonly used authentication approaches (in the computer/IT environment), their pros and cons, and also about access control issues.
- Syllabus
- Data authentication. Electronic signature and its use. Authentication of machines and applications. Authentication of users: secret information, tokens. Introduction to biometric authentication. Frequently used biometrics. Problems of deploying biometrics. Authorization and access control. Discretionary access control. Multilevel systems.
- Literature
- BISHOP, Matt. Computer security :art and science. Boston: Addison-Wesley, 2003, xli, 1084. ISBN 0-201-44099-7. info
- MENEZES, A. J., Paul van OORSCHOT and Scott A. VANSTONE. Handbook of applied cryptography. Boca Raton: CRC Press, 1997, xiii, 780. ISBN 0-8493-8523-7. info
- ANDERSON, Ross J. Security Engineering: A Guide to Building Dependable Distributed Systems. 2001st ed. John Wiley & Sons, 2001. ISBN 0-471-38922-6. info
- JAIN, Anil K., Ruud BOLLE and Sharath PANKANTI. Biometrics: Personal Identification in Networked Society. Norwell, Massachusetts: Kluwer Academic Publishers, 1999, 411 pp. Second printing 1999. ISBN 0-7923-8345-1. info
- Assessment methods (in Czech)
- Pisemna zaverecna zkouska (lze ziskat az 70 % bodu) ve zkouskovem obdobi. Polosemestralni pisemna zkouska (lze ziskat az 30 % bodu).
- Language of instruction
- Czech
- Follow-Up Courses
- Further Comments
- The course is taught annually.
- Listed among pre-requisites of other courses
- Enrolment Statistics (Spring 2008, recent)
- Permalink: https://is.muni.cz/course/fi/spring2008/PV157