PV157 Authentication and Access Control

Faculty of Informatics
Spring 2009
Extent and Intensity
2/0. 2 credit(s) (plus extra credits for completion). Recommended Type of Completion: zk (examination). Other types of completion: k (colloquium).
Teacher(s)
prof. RNDr. Václav Matyáš, M.Sc., Ph.D. (lecturer)
Ing. Mgr. et Mgr. Zdeněk Říha, Ph.D. (lecturer)
Mgr. et Mgr. Jan Krhovják, Ph.D. (assistant)
RNDr. Marek Kumpošt, Ph.D. (assistant)
doc. RNDr. Petr Švenda, Ph.D. (assistant)
Guaranteed by
prof. RNDr. Václav Matyáš, M.Sc., Ph.D.
Department of Computer Systems and Communications – Faculty of Informatics
Timetable
Tue 10:00–11:50 D3
Prerequisites
Recommended option is to register this course after PV080.
Course Enrolment Limitations
The course is also offered to the students of the fields other than those the course is directly associated with.
The capacity limit for the course is 262 student(s).
Current registration and enrolment status: enrolled: 0/262, only registered: 0/262, only registered with preference (fields directly associated with the programme): 0/262
fields of study / plans the course is directly associated with
there are 33 fields of study the course is directly associated with, display
Course objectives
This course further develops the knowledge of students (namely after passing PV080) in the areas of authentication and access control. A particular attention is paid to biometric authentication methods, their use and practical problems. Students will learn about all commonly used authentication approaches (in the computer/IT environment), their pros and cons, and also about access control issues.
Syllabus
  • Data authentication. Electronic signature and its use. Authentication of machines and applications. Authentication of users: secret information, tokens. Introduction to biometric authentication. Frequently used biometrics. Problems of deploying biometrics. Authorization and access control. Discretionary access control. Multilevel systems.
Literature
  • BISHOP, Matt. Computer security :art and science. Boston: Addison-Wesley, 2003, xli, 1084. ISBN 0-201-44099-7. info
  • MENEZES, A. J., Paul van OORSCHOT and Scott A. VANSTONE. Handbook of applied cryptography. Boca Raton: CRC Press, 1997, xiii, 780. ISBN 0-8493-8523-7. info
  • ANDERSON, Ross J. Security Engineering: A Guide to Building Dependable Distributed Systems. 2001st ed. John Wiley & Sons, 2001. ISBN 0-471-38922-6. info
  • JAIN, Anil K., Ruud BOLLE and Sharath PANKANTI. Biometrics: Personal Identification in Networked Society. Norwell, Massachusetts: Kluwer Academic Publishers, 1999, 411 pp. Second printing 1999. ISBN 0-7923-8345-1. info
Assessment methods
Written final exam (up to 70% of points), written mid-term exam (up to 30% of points)
Language of instruction
Czech
Follow-Up Courses
Further Comments
The course is taught annually.
Listed among pre-requisites of other courses
The course is also listed under the following terms Autumn 2002, Autumn 2003, Autumn 2004, Spring 2006, Spring 2007, Spring 2008, Spring 2010, Spring 2011, Spring 2012, Spring 2013, Spring 2014, Spring 2015, Spring 2016, Spring 2017, Spring 2018, Spring 2019, Spring 2020, Autumn 2021, Autumn 2022, Autumn 2023, Autumn 2024.
  • Enrolment Statistics (Spring 2009, recent)
  • Permalink: https://is.muni.cz/course/fi/spring2009/PV157