PV222 Security Architectures

Faculty of Informatics
Spring 2023
Extent and Intensity
1/1/1. 2 credit(s) (plus extra credits for completion). Type of Completion: k (colloquium).
Taught in person.
Teacher(s)
Dr. Geraint Price (lecturer), prof. RNDr. Václav Matyáš, M.Sc., Ph.D. (deputy)
prof. RNDr. Václav Matyáš, M.Sc., Ph.D. (lecturer)
Guaranteed by
prof. RNDr. Václav Matyáš, M.Sc., Ph.D.
Department of Computer Systems and Communications – Faculty of Informatics
Contact Person: prof. RNDr. Václav Matyáš, M.Sc., Ph.D.
Supplier department: Department of Computer Systems and Communications – Faculty of Informatics
Timetable
Mon 27. 3. 16:00–17:50 A218, Tue 28. 3. 14:00–15:50 B410, Wed 29. 3. 16:00–17:50 A217, Thu 30. 3. 12:00–13:50 A318, Fri 31. 3. 12:00–13:50 B410, Mon 3. 4. 12:00–13:50 A217, 16:00–17:50 A217, Tue 4. 4. 14:00–15:50 B410, Wed 5. 4. 16:00–17:50 A217, Thu 6. 4. 8:00–14:00 A420, Tue 11. 4. 8:00–14:00 A420
Prerequisites
PV017 IT Security || PV079 Applied Cryptography || PV157 Authentication and AC || IV054 Cryptography and C.Protocols || IA174 Fundaments of Cryptography || SOUHLAS
Any of the following security/crypto courses: PV017||PV079||PV157||IV054||IA174
Course Enrolment Limitations
The course is also offered to the students of the fields other than those the course is directly associated with.
The capacity limit for the course is 30 student(s).
Current registration and enrolment status: enrolled: 5/30, only registered: 0/30, only registered with preference (fields directly associated with the programme): 0/30
fields of study / plans the course is directly associated with
there are 67 fields of study the course is directly associated with, display
Course objectives
This course will cover a number of topics centered around the design and implementation of security architectures. The high-level aim of this course is to discuss the appropriate system design choices, primarily at the conceptual/architectural level, which impact the security of an organisation’s information, along with how the business requirements of an organisation can influence the design and implementation of those security architectures. The core components of the course will cover the following topics: Identity Management; Security Models; Cloud Computing; PCI-DSS; Bring Your Own Device (BYOD).
Syllabus
  • This course will cover a number of topics centered around the design and implementation of security architectures. The high-level aim of this course is to discuss the appropriate system design choices, primarily at the conceptual/architectural level, which impact the security of an organisation’s information, along with how the business requirements of an organisation can influence the design and implementation of those security architectures. The core components of the course will cover the following topics: Identity Management; Security Models; Cloud Computing; PCI-DSS; Bring Your Own Device (BYOD).
Literature
  • GUTMANN, Peter. Cryptographic security architecture : design and verification. Berlin: Springer, 2004, xviii, 320. ISBN 0387953876. info
Teaching methods
Seminars mainly with presentations from the lecturer, supplemented by discussions of problems and case studies with students.
Assessment methods
Colloquial discussion after the last lecture. Homework and active participation in the lectures shall be also considered.
Language of instruction
English
Follow-Up Courses
Further comments (probably available only in Czech)
Study Materials
The course is taught annually.
Teacher's information
Spring 2023 - the course will take place on: 27.3. 16-18 A218, 28.3. 14-16 B410, 29.3. 16-18 A217, 30.3. 12-14 A318, 31.3. 12-14 B410, 3.4. 12-14 and 16-18 A217, 4.4. 14-16 B410, 5.4. 16-18 A218. The final colloquial discussions will take place in the mornings of April 6 and 11.
The course is also listed under the following terms Spring 2009, Spring 2011, Spring 2013, Spring 2015, Spring 2018, Spring 2022.

PV222 Security Architectures

Faculty of Informatics
Spring 2022
Extent and Intensity
1/1/1. 2 credit(s) (plus extra credits for completion). Type of Completion: k (colloquium).
Taught in person.
Teacher(s)
Dr. Geraint Price (lecturer), prof. RNDr. Václav Matyáš, M.Sc., Ph.D. (deputy)
prof. RNDr. Václav Matyáš, M.Sc., Ph.D. (lecturer)
Guaranteed by
prof. RNDr. Václav Matyáš, M.Sc., Ph.D.
Department of Computer Systems and Communications – Faculty of Informatics
Contact Person: prof. RNDr. Václav Matyáš, M.Sc., Ph.D.
Supplier department: Department of Computer Systems and Communications – Faculty of Informatics
Prerequisites
PV017 IT Security || PV079 Applied Cryptography || PV157 Authentication and AC || IV054 Cryptography and C.Protocols || IA174 Fundaments of Cryptography || SOUHLAS
Any of the following security/crypto courses: PV017||PV079||PV157||IV054
Course Enrolment Limitations
The course is also offered to the students of the fields other than those the course is directly associated with.
The capacity limit for the course is 30 student(s).
Current registration and enrolment status: enrolled: 0/30, only registered: 0/30, only registered with preference (fields directly associated with the programme): 0/30
fields of study / plans the course is directly associated with
there are 67 fields of study the course is directly associated with, display
Course objectives
This course will cover a number of topics related to the design and implementation of security architectures. The course content will broadly cover the following topics: access control mechanisms; web security; wireless LAN security; mobile (GSM & UMTS) security; identity management. The aim in each of these sessions will be to concentrate on how the security services in the architectures are constructed from underlying technical mechanisms. In addition, we will consider how the implementation of these mechanisms are not always perfect in real world implementations, and how the business requirements of an organisation can impact how we implement security.
Syllabus
  • This course will cover a number of topics related to the design and implementation of security architectures. The course content will broadly cover the following topics: access control mechanisms; web security; wireless LAN security; mobile (GSM & UMTS) security; identity management. The aim in each of these sessions will be to concentrate on how the security services in the architectures are constructed from underlying technical mechanisms. In addition, we will consider how the implementation of these mechanisms are not always perfect in real world implementations, and how the business requirements of an organisation can impact how we implement security.
Literature
  • GUTMANN, Peter. Cryptographic security architecture : design and verification. Berlin: Springer, 2004, xviii, 320. ISBN 0387953876. info
Teaching methods
Seminars mainly with presentations from the lecturer, supplemented by discussions of problems and case studies with students.
Assessment methods
Colloquial discussion after the last lecture. Homework and active participation in the lectures shall be also considered.
Language of instruction
English
Follow-Up Courses
Further comments (probably available only in Czech)
Study Materials
The course is taught annually.
The course is taught: in blocks.
Note related to how often the course is taught: Od 18.4. Ut 16:00-20:00 a Pa 10:00-14:00, do 4.5.
The course is also listed under the following terms Spring 2009, Spring 2011, Spring 2013, Spring 2015, Spring 2018, Spring 2023.

PV222 Security Architectures

Faculty of Informatics
Spring 2018
Extent and Intensity
3/1. 2 credit(s) (plus extra credits for completion). Type of Completion: k (colloquium).
Teacher(s)
Dr. Geraint Price (lecturer), prof. RNDr. Václav Matyáš, M.Sc., Ph.D. (deputy)
prof. RNDr. Václav Matyáš, M.Sc., Ph.D. (lecturer)
Guaranteed by
doc. RNDr. Eva Hladká, Ph.D.
Department of Computer Systems and Communications – Faculty of Informatics
Contact Person: prof. RNDr. Václav Matyáš, M.Sc., Ph.D.
Supplier department: Department of Computer Systems and Communications – Faculty of Informatics
Timetable
Mon 26. 3. 18:00–19:50 D1, Tue 27. 3. 10:00–11:50 D1, Wed 28. 3. 8:00–9:50 A318, 12:00–13:50 D1, Thu 29. 3. 18:00–19:50 D1, Tue 3. 4. 10:00–11:50 D1, Wed 4. 4. 8:00–9:50 A318, 12:00–13:50 D1, Thu 5. 4. 18:00–19:50 D1, Fri 6. 4. 12:00–17:50 A318
Prerequisites
PV017 IT Security || PV079 Applied Cryptography || PV157 Authentication and AC || IV054 Cryptography and C.Protocols || SOUHLAS
Any of the following security/crypto courses: PV017||PV079||PV157||IV054
Course Enrolment Limitations
The course is also offered to the students of the fields other than those the course is directly associated with.
The capacity limit for the course is 30 student(s).
Current registration and enrolment status: enrolled: 0/30, only registered: 0/30, only registered with preference (fields directly associated with the programme): 0/30
fields of study / plans the course is directly associated with
there are 30 fields of study the course is directly associated with, display
Course objectives
This course will cover a number of topics related to the design and implementation of security architectures. The course content will broadly cover the following topics: access control mechanisms; web security; wireless LAN security; mobile (GSM & UMTS) security; identity management. The aim in each of these sessions will be to concentrate on how the security services in the architectures are constructed from underlying technical mechanisms. In addition, we will consider how the implementation of these mechanisms are not always perfect in real world implementations, and how the business requirements of an organisation can impact how we implement security.
Syllabus
  • This course will cover a number of topics related to the design and implementation of security architectures. The course content will broadly cover the following topics: access control mechanisms; web security; wireless LAN security; mobile (GSM & UMTS) security; identity management. The aim in each of these sessions will be to concentrate on how the security services in the architectures are constructed from underlying technical mechanisms. In addition, we will consider how the implementation of these mechanisms are not always perfect in real world implementations, and how the business requirements of an organisation can impact how we implement security.
Literature
  • GUTMANN, Peter. Cryptographic security architecture : design and verification. Berlin: Springer, 2004, xviii, 320. ISBN 0387953876. info
Teaching methods
Seminars mainly with presentations from the lecturer, supplemented by discussions of problems and case studies with students.
Assessment methods
Colloquial discussion after the last lecture. Homework and active participation in the lectures shall be also considered.
Language of instruction
English
Follow-Up Courses
Further comments (probably available only in Czech)
The course is taught once in two years.
The course is also listed under the following terms Spring 2009, Spring 2011, Spring 2013, Spring 2015, Spring 2022, Spring 2023.

PV222 Security Architectures

Faculty of Informatics
Spring 2015
Extent and Intensity
3/1. 2 credit(s) (plus extra credits for completion). Type of Completion: k (colloquium).
Teacher(s)
Dr. Geraint Price (lecturer), prof. RNDr. Václav Matyáš, M.Sc., Ph.D. (deputy)
prof. RNDr. Václav Matyáš, M.Sc., Ph.D. (lecturer)
Guaranteed by
doc. RNDr. Eva Hladká, Ph.D.
Department of Computer Systems and Communications – Faculty of Informatics
Contact Person: prof. RNDr. Václav Matyáš, M.Sc., Ph.D.
Supplier department: Department of Computer Systems and Communications – Faculty of Informatics
Prerequisites
PV017 IT Security || PV079 Applied Cryptography || PV157 Authentication and AC || IV054 Cryptography and C.Protocols || SOUHLAS
Any of the following security/crypto courses: PV017||PV079||PV157||IV054
Course Enrolment Limitations
The course is also offered to the students of the fields other than those the course is directly associated with.
The capacity limit for the course is 30 student(s).
Current registration and enrolment status: enrolled: 0/30, only registered: 0/30, only registered with preference (fields directly associated with the programme): 0/30
fields of study / plans the course is directly associated with
there are 29 fields of study the course is directly associated with, display
Course objectives
This course will cover a number of topics related to the design and implementation of security architectures. The course content will broadly cover the following topics: access control mechanisms; web security; wireless LAN security; mobile (GSM & UMTS) security; identity management. The aim in each of these sessions will be to concentrate on how the security services in the architectures are constructed from underlying technical mechanisms. In addition, we will consider how the implementation of these mechanisms are not always perfect in real world implementations, and how the business requirements of an organisation can impact how we implement security.
Syllabus
  • This course will cover a number of topics related to the design and implementation of security architectures. The course content will broadly cover the following topics: access control mechanisms; web security; wireless LAN security; mobile (GSM & UMTS) security; identity management. The aim in each of these sessions will be to concentrate on how the security services in the architectures are constructed from underlying technical mechanisms. In addition, we will consider how the implementation of these mechanisms are not always perfect in real world implementations, and how the business requirements of an organisation can impact how we implement security.
Literature
  • GUTMANN, Peter. Cryptographic security architecture : design and verification. Berlin: Springer, 2004, xviii, 320. ISBN 0387953876. info
Teaching methods
Seminars mainly with presentations from the lecturer, supplemented by discussions of problems and case studies with students.
Assessment methods
Colloquial discussion after the last lecture. Homework and active participation in the lectures shall be also considered.
Language of instruction
English
Follow-Up Courses
Further comments (probably available only in Czech)
The course is taught once in two years.
The course is taught: in blocks.
Note related to how often the course is taught: Od 18.4. Ut 16:00-20:00 a Pa 10:00-14:00, do 4.5.
The course is also listed under the following terms Spring 2009, Spring 2011, Spring 2013, Spring 2018, Spring 2022, Spring 2023.

PV222 Security Architectures

Faculty of Informatics
Spring 2013
Extent and Intensity
3/1. 2 credit(s) (plus extra credits for completion). Type of Completion: k (colloquium).
Teacher(s)
Dr. Geraint Price (lecturer), prof. RNDr. Václav Matyáš, M.Sc., Ph.D. (deputy)
prof. RNDr. Václav Matyáš, M.Sc., Ph.D. (lecturer)
Guaranteed by
doc. RNDr. Vlastislav Dohnal, Ph.D.
Department of Computer Systems and Communications – Faculty of Informatics
Contact Person: prof. RNDr. Václav Matyáš, M.Sc., Ph.D.
Supplier department: Department of Computer Systems and Communications – Faculty of Informatics
Prerequisites
PV017 IT Security || PV079 Applied Cryptography || PV157 Authentication and AC || IV054 Cryptography and C.Protocols || SOUHLAS
Any of the following security/crypto courses: PV017||PV079||PV157||IV054
Course Enrolment Limitations
The course is also offered to the students of the fields other than those the course is directly associated with.
The capacity limit for the course is 30 student(s).
Current registration and enrolment status: enrolled: 0/30, only registered: 0/30, only registered with preference (fields directly associated with the programme): 0/30
fields of study / plans the course is directly associated with
there are 29 fields of study the course is directly associated with, display
Course objectives
This course will cover a number of topics related to the design and implementation of security architectures. The course content will broadly cover the following topics: access control mechanisms; web security; wireless LAN security; mobile (GSM & UMTS) security; identity management. The aim in each of these sessions will be to concentrate on how the security services in the architectures are constructed from underlying technical mechanisms. In addition, we will consider how the implementation of these mechanisms are not always perfect in real world implementations, and how the business requirements of an organisation can impact how we implement security.
Syllabus
  • This course will cover a number of topics related to the design and implementation of security architectures. The course content will broadly cover the following topics: access control mechanisms; web security; wireless LAN security; mobile (GSM & UMTS) security; identity management. The aim in each of these sessions will be to concentrate on how the security services in the architectures are constructed from underlying technical mechanisms. In addition, we will consider how the implementation of these mechanisms are not always perfect in real world implementations, and how the business requirements of an organisation can impact how we implement security.
Assessment methods
Colloquial discussion at the end of the lectures = third week of April. Homework and active participation in the lectures shall be also considered.
Language of instruction
English
Follow-Up Courses
Further comments (probably available only in Czech)
Study Materials
The course is taught once in two years.
The course is taught: in blocks.
Note related to how often the course is taught: Od St 3.4. do Pa 19.4.
The course is also listed under the following terms Spring 2009, Spring 2011, Spring 2015, Spring 2018, Spring 2022, Spring 2023.

PV222 Security Architectures

Faculty of Informatics
Spring 2011
Extent and Intensity
3/1. 2 credit(s) (plus extra credits for completion). Type of Completion: k (colloquium).
Teacher(s)
Dr. Geraint Price (lecturer), prof. RNDr. Václav Matyáš, M.Sc., Ph.D. (deputy)
prof. RNDr. Václav Matyáš, M.Sc., Ph.D. (lecturer)
Guaranteed by
prof. RNDr. Václav Matyáš, M.Sc., Ph.D.
Department of Computer Systems and Communications – Faculty of Informatics
Contact Person: prof. RNDr. Václav Matyáš, M.Sc., Ph.D.
Prerequisites
PV017 IT Security || PV079 Applied Cryptography || PV157 Authentication and AC || IV054 Cryptography and C.Protocols || SOUHLAS
Any of the following security/crypto courses: PV017||PV079||PV157||IV054
Course Enrolment Limitations
The course is also offered to the students of the fields other than those the course is directly associated with.
The capacity limit for the course is 30 student(s).
Current registration and enrolment status: enrolled: 0/30, only registered: 0/30, only registered with preference (fields directly associated with the programme): 0/30
fields of study / plans the course is directly associated with
there are 32 fields of study the course is directly associated with, display
Course objectives
This course will cover a number of topics related to the design and implementation of security architectures. The course content will broadly cover the following topics: access control mechanisms; web security; wireless LAN security; mobile (GSM & UMTS) security; identity management. The aim in each of these sessions will be to concentrate on how the security services in the architectures are constructed from underlying technical mechanisms. In addition, we will consider how the implementation of these mechanisms are not always perfect in real world implementations, and how the business requirements of an organisation can impact how we implement security.
Syllabus
  • This course will cover a number of topics related to the design and implementation of security architectures. The course content will broadly cover the following topics: access control mechanisms; web security; wireless LAN security; mobile (GSM & UMTS) security; identity management. The aim in each of these sessions will be to concentrate on how the security services in the architectures are constructed from underlying technical mechanisms. In addition, we will consider how the implementation of these mechanisms are not always perfect in real world implementations, and how the business requirements of an organisation can impact how we implement security.
Assessment methods
Colloquial discussion at the end of the lectures = first week of May. Homework and active participation in the lectures shall be also considered.
Language of instruction
English
Follow-Up Courses
Further comments (probably available only in Czech)
Study Materials
The course is taught once in two years.
The course is taught: in blocks.
Note related to how often the course is taught: Od 18.4. Ut 16:00-20:00 a Pa 10:00-14:00, do 4.5.
The course is also listed under the following terms Spring 2009, Spring 2013, Spring 2015, Spring 2018, Spring 2022, Spring 2023.

PV222 Security Architectures

Faculty of Informatics
Spring 2009
Extent and Intensity
3/1. 2 credit(s) (plus extra credits for completion). Type of Completion: k (colloquium).
Teacher(s)
Geraint Price (lecturer), Dr. Geraint Price (deputy)
prof. RNDr. Václav Matyáš, M.Sc., Ph.D. (lecturer)
Guaranteed by
prof. RNDr. Václav Matyáš, M.Sc., Ph.D.
Department of Computer Systems and Communications – Faculty of Informatics
Contact Person: prof. RNDr. Václav Matyáš, M.Sc., Ph.D.
Timetable
Thu 26. 3. 16:00–19:50 C416, Thu 2. 4. 16:00–19:50 C416, Thu 9. 4. 16:00–19:50 C416, Thu 16. 4. 16:00–19:50 C416, Thu 23. 4. 16:00–19:50 C416, Thu 30. 4. 16:00–19:50 C416
Prerequisites
PV017 IT Security || PV079 Applied Cryptography || PV157 Authentication and AC || IV054 Cryptography and C.Protocols || SOUHLAS
Any of the following security/crypto courses: PV017||PV079||PV157||IV054
Course Enrolment Limitations
The course is also offered to the students of the fields other than those the course is directly associated with.
The capacity limit for the course is 30 student(s).
Current registration and enrolment status: enrolled: 0/30, only registered: 0/30, only registered with preference (fields directly associated with the programme): 0/30
fields of study / plans the course is directly associated with
there are 33 fields of study the course is directly associated with, display
Course objectives
This course will cover a number of topics related to the design and implementation of security architectures. The course content will broadly cover the following topics: access control mechanisms; web security; wireless LAN security; mobile (GSM & UMTS) security; identity management. The aim in each of these sessions will be to concentrate on how the security services in the architectures are constructed from underlying technical mechanisms. In addition, we will consider how the implementation of these mechanisms are not always perfect in real world implementations, and how the business requirements of an organisation can impact how we implement security.
Syllabus
  • This course will cover a number of topics related to the design and implementation of security architectures. The course content will broadly cover the following topics: access control mechanisms; web security; wireless LAN security; mobile (GSM & UMTS) security; identity management. The aim in each of these sessions will be to concentrate on how the security services in the architectures are constructed from underlying technical mechanisms. In addition, we will consider how the implementation of these mechanisms are not always perfect in real world implementations, and how the business requirements of an organisation can impact how we implement security.
Assessment methods
Colloquial discussion at the end of the lectures = last week of April. Homework and active participation in the lectures shall be also considered.
Language of instruction
English
Follow-Up Courses
Further Comments
Study Materials
The course is taught only once.
The course is also listed under the following terms Spring 2011, Spring 2013, Spring 2015, Spring 2018, Spring 2022, Spring 2023.

PV222 Security Architectures

Faculty of Informatics
Spring 2024

The course is not taught in Spring 2024

Extent and Intensity
1/1/1. 2 credit(s) (plus extra credits for completion). Type of Completion: k (colloquium).
Taught in person.
Teacher(s)
Dr. Geraint Price (lecturer), prof. RNDr. Václav Matyáš, M.Sc., Ph.D. (deputy)
prof. RNDr. Václav Matyáš, M.Sc., Ph.D. (lecturer)
Guaranteed by
prof. RNDr. Václav Matyáš, M.Sc., Ph.D.
Department of Computer Systems and Communications – Faculty of Informatics
Contact Person: prof. RNDr. Václav Matyáš, M.Sc., Ph.D.
Supplier department: Department of Computer Systems and Communications – Faculty of Informatics
Prerequisites
PV017 IT Security || PV079 Applied Cryptography || PV157 Authentication and AC || IV054 Cryptography and C.Protocols || IA174 Fundaments of Cryptography || SOUHLAS
Any of the following security/crypto courses: PV017||PV079||PV157||IV054||IA174
Course Enrolment Limitations
The course is also offered to the students of the fields other than those the course is directly associated with.
The capacity limit for the course is 30 student(s).
Current registration and enrolment status: enrolled: 0/30, only registered: 0/30, only registered with preference (fields directly associated with the programme): 0/30
fields of study / plans the course is directly associated with
there are 67 fields of study the course is directly associated with, display
Course objectives
This course will cover a number of topics centered around the design and implementation of security architectures. The high-level aim of this course is to discuss the appropriate system design choices, primarily at the conceptual/architectural level, which impact the security of an organisation’s information, along with how the business requirements of an organisation can influence the design and implementation of those security architectures. The core components of the course will cover the following topics: Identity Management; Security Models; Cloud Computing; PCI-DSS; Bring Your Own Device (BYOD).
Syllabus
  • This course will cover a number of topics centered around the design and implementation of security architectures. The high-level aim of this course is to discuss the appropriate system design choices, primarily at the conceptual/architectural level, which impact the security of an organisation’s information, along with how the business requirements of an organisation can influence the design and implementation of those security architectures. The core components of the course will cover the following topics: Identity Management; Security Models; Cloud Computing; PCI-DSS; Bring Your Own Device (BYOD).
Literature
  • GUTMANN, Peter. Cryptographic security architecture : design and verification. Berlin: Springer, 2004, xviii, 320. ISBN 0387953876. info
Teaching methods
Seminars mainly with presentations from the lecturer, supplemented by discussions of problems and case studies with students.
Assessment methods
Colloquial discussion after the last lecture. Homework and active participation in the lectures shall be also considered.
Language of instruction
English
Follow-Up Courses
Further comments (probably available only in Czech)
The course is taught once in two years.
The course is taught: in blocks.
Note related to how often the course is taught: Od 18.4. Ut 16:00-20:00 a Pa 10:00-14:00, do 4.5.
Teacher's information
Spring 2023 - the course will take place on: 27.3. 16-18 A218, 28.3. 14-16 B410, 29.3. 16-18 A217, 30.3. 12-14 A318, 31.3. 12-14 B410, 3.4. 12-14 and 16-18 A217, 4.4. 14-16 B410, 5.4. 16-18 A218. The final colloquial discussions will take place in the mornings of April 6 and 11.
The course is also listed under the following terms Spring 2009, Spring 2011, Spring 2013, Spring 2015, Spring 2018, Spring 2022, Spring 2023.

PV222 Security Architectures

Faculty of Informatics
Spring 2021

The course is not taught in Spring 2021

Extent and Intensity
3/1. 2 credit(s) (plus extra credits for completion). Type of Completion: k (colloquium).
Taught online.
Teacher(s)
Dr. Geraint Price (lecturer), prof. RNDr. Václav Matyáš, M.Sc., Ph.D. (deputy)
prof. RNDr. Václav Matyáš, M.Sc., Ph.D. (lecturer)
Guaranteed by
prof. RNDr. Václav Matyáš, M.Sc., Ph.D.
Department of Computer Systems and Communications – Faculty of Informatics
Contact Person: prof. RNDr. Václav Matyáš, M.Sc., Ph.D.
Supplier department: Department of Computer Systems and Communications – Faculty of Informatics
Prerequisites
PV017 IT Security || PV079 Applied Cryptography || PV157 Authentication and AC || IV054 Cryptography and C.Protocols || SOUHLAS
Any of the following security/crypto courses: PV017||PV079||PV157||IV054
Course Enrolment Limitations
The course is also offered to the students of the fields other than those the course is directly associated with.
The capacity limit for the course is 30 student(s).
Current registration and enrolment status: enrolled: 0/30, only registered: 0/30, only registered with preference (fields directly associated with the programme): 0/30
fields of study / plans the course is directly associated with
there are 67 fields of study the course is directly associated with, display
Course objectives
This course will cover a number of topics related to the design and implementation of security architectures. The course content will broadly cover the following topics: access control mechanisms; web security; wireless LAN security; mobile (GSM & UMTS) security; identity management. The aim in each of these sessions will be to concentrate on how the security services in the architectures are constructed from underlying technical mechanisms. In addition, we will consider how the implementation of these mechanisms are not always perfect in real world implementations, and how the business requirements of an organisation can impact how we implement security.
Syllabus
  • This course will cover a number of topics related to the design and implementation of security architectures. The course content will broadly cover the following topics: access control mechanisms; web security; wireless LAN security; mobile (GSM & UMTS) security; identity management. The aim in each of these sessions will be to concentrate on how the security services in the architectures are constructed from underlying technical mechanisms. In addition, we will consider how the implementation of these mechanisms are not always perfect in real world implementations, and how the business requirements of an organisation can impact how we implement security.
Literature
  • GUTMANN, Peter. Cryptographic security architecture : design and verification. Berlin: Springer, 2004, xviii, 320. ISBN 0387953876. info
Teaching methods
Seminars mainly with presentations from the lecturer, supplemented by discussions of problems and case studies with students.
Assessment methods
Colloquial discussion after the last lecture. Homework and active participation in the lectures shall be also considered.
Language of instruction
English
Follow-Up Courses
Further comments (probably available only in Czech)
The course is taught once in two years.
The course is taught: in blocks.
Note related to how often the course is taught: Od 18.4. Ut 16:00-20:00 a Pa 10:00-14:00, do 4.5.
The course is also listed under the following terms Spring 2009, Spring 2011, Spring 2013, Spring 2015, Spring 2018, Spring 2022, Spring 2023.

PV222 Security Architectures

Faculty of Informatics
Spring 2020

The course is not taught in Spring 2020

Extent and Intensity
3/1. 2 credit(s) (plus extra credits for completion). Type of Completion: k (colloquium).
Teacher(s)
Dr. Geraint Price (lecturer), prof. RNDr. Václav Matyáš, M.Sc., Ph.D. (deputy)
prof. RNDr. Václav Matyáš, M.Sc., Ph.D. (lecturer)
Guaranteed by
prof. RNDr. Václav Matyáš, M.Sc., Ph.D.
Department of Computer Systems and Communications – Faculty of Informatics
Contact Person: prof. RNDr. Václav Matyáš, M.Sc., Ph.D.
Supplier department: Department of Computer Systems and Communications – Faculty of Informatics
Prerequisites
PV017 IT Security || PV079 Applied Cryptography || PV157 Authentication and AC || IV054 Cryptography and C.Protocols || SOUHLAS
Any of the following security/crypto courses: PV017||PV079||PV157||IV054
Course Enrolment Limitations
The course is also offered to the students of the fields other than those the course is directly associated with.
The capacity limit for the course is 30 student(s).
Current registration and enrolment status: enrolled: 0/30, only registered: 0/30, only registered with preference (fields directly associated with the programme): 0/30
fields of study / plans the course is directly associated with
there are 67 fields of study the course is directly associated with, display
Course objectives
This course will cover a number of topics related to the design and implementation of security architectures. The course content will broadly cover the following topics: access control mechanisms; web security; wireless LAN security; mobile (GSM & UMTS) security; identity management. The aim in each of these sessions will be to concentrate on how the security services in the architectures are constructed from underlying technical mechanisms. In addition, we will consider how the implementation of these mechanisms are not always perfect in real world implementations, and how the business requirements of an organisation can impact how we implement security.
Syllabus
  • This course will cover a number of topics related to the design and implementation of security architectures. The course content will broadly cover the following topics: access control mechanisms; web security; wireless LAN security; mobile (GSM & UMTS) security; identity management. The aim in each of these sessions will be to concentrate on how the security services in the architectures are constructed from underlying technical mechanisms. In addition, we will consider how the implementation of these mechanisms are not always perfect in real world implementations, and how the business requirements of an organisation can impact how we implement security.
Literature
  • GUTMANN, Peter. Cryptographic security architecture : design and verification. Berlin: Springer, 2004, xviii, 320. ISBN 0387953876. info
Teaching methods
Seminars mainly with presentations from the lecturer, supplemented by discussions of problems and case studies with students.
Assessment methods
Colloquial discussion after the last lecture. Homework and active participation in the lectures shall be also considered.
Language of instruction
English
Follow-Up Courses
Further comments (probably available only in Czech)
The course is taught once in two years.
The course is taught: in blocks.
Note related to how often the course is taught: Od 18.4. Ut 16:00-20:00 a Pa 10:00-14:00, do 4.5.
The course is also listed under the following terms Spring 2009, Spring 2011, Spring 2013, Spring 2015, Spring 2018, Spring 2022, Spring 2023.

PV222 Security Architectures

Faculty of Informatics
Spring 2019

The course is not taught in Spring 2019

Extent and Intensity
3/1. 2 credit(s) (plus extra credits for completion). Type of Completion: k (colloquium).
Teacher(s)
Dr. Geraint Price (lecturer), prof. RNDr. Václav Matyáš, M.Sc., Ph.D. (deputy)
prof. RNDr. Václav Matyáš, M.Sc., Ph.D. (lecturer)
Guaranteed by
doc. RNDr. Eva Hladká, Ph.D.
Department of Computer Systems and Communications – Faculty of Informatics
Contact Person: prof. RNDr. Václav Matyáš, M.Sc., Ph.D.
Supplier department: Department of Computer Systems and Communications – Faculty of Informatics
Prerequisites
PV017 IT Security || PV079 Applied Cryptography || PV157 Authentication and AC || IV054 Cryptography and C.Protocols || SOUHLAS
Any of the following security/crypto courses: PV017||PV079||PV157||IV054
Course Enrolment Limitations
The course is also offered to the students of the fields other than those the course is directly associated with.
The capacity limit for the course is 30 student(s).
Current registration and enrolment status: enrolled: 0/30, only registered: 0/30, only registered with preference (fields directly associated with the programme): 0/30
fields of study / plans the course is directly associated with
there are 30 fields of study the course is directly associated with, display
Course objectives
This course will cover a number of topics related to the design and implementation of security architectures. The course content will broadly cover the following topics: access control mechanisms; web security; wireless LAN security; mobile (GSM & UMTS) security; identity management. The aim in each of these sessions will be to concentrate on how the security services in the architectures are constructed from underlying technical mechanisms. In addition, we will consider how the implementation of these mechanisms are not always perfect in real world implementations, and how the business requirements of an organisation can impact how we implement security.
Syllabus
  • This course will cover a number of topics related to the design and implementation of security architectures. The course content will broadly cover the following topics: access control mechanisms; web security; wireless LAN security; mobile (GSM & UMTS) security; identity management. The aim in each of these sessions will be to concentrate on how the security services in the architectures are constructed from underlying technical mechanisms. In addition, we will consider how the implementation of these mechanisms are not always perfect in real world implementations, and how the business requirements of an organisation can impact how we implement security.
Literature
  • GUTMANN, Peter. Cryptographic security architecture : design and verification. Berlin: Springer, 2004, xviii, 320. ISBN 0387953876. info
Teaching methods
Seminars mainly with presentations from the lecturer, supplemented by discussions of problems and case studies with students.
Assessment methods
Colloquial discussion after the last lecture. Homework and active participation in the lectures shall be also considered.
Language of instruction
English
Follow-Up Courses
Further comments (probably available only in Czech)
The course is taught once in two years.
The course is taught: in blocks.
Note related to how often the course is taught: Od 18.4. Ut 16:00-20:00 a Pa 10:00-14:00, do 4.5.
The course is also listed under the following terms Spring 2009, Spring 2011, Spring 2013, Spring 2015, Spring 2018, Spring 2022, Spring 2023.

PV222 Security Architectures

Faculty of Informatics
Spring 2017

The course is not taught in Spring 2017

Extent and Intensity
3/1. 2 credit(s) (plus extra credits for completion). Type of Completion: k (colloquium).
Teacher(s)
Dr. Geraint Price (lecturer), prof. RNDr. Václav Matyáš, M.Sc., Ph.D. (deputy)
prof. RNDr. Václav Matyáš, M.Sc., Ph.D. (lecturer)
Guaranteed by
doc. RNDr. Eva Hladká, Ph.D.
Department of Computer Systems and Communications – Faculty of Informatics
Contact Person: prof. RNDr. Václav Matyáš, M.Sc., Ph.D.
Supplier department: Department of Computer Systems and Communications – Faculty of Informatics
Prerequisites
PV017 IT Security || PV079 Applied Cryptography || PV157 Authentication and AC || IV054 Cryptography and C.Protocols || SOUHLAS
Any of the following security/crypto courses: PV017||PV079||PV157||IV054
Course Enrolment Limitations
The course is also offered to the students of the fields other than those the course is directly associated with.
The capacity limit for the course is 30 student(s).
Current registration and enrolment status: enrolled: 0/30, only registered: 0/30, only registered with preference (fields directly associated with the programme): 0/30
fields of study / plans the course is directly associated with
there are 30 fields of study the course is directly associated with, display
Course objectives
This course will cover a number of topics related to the design and implementation of security architectures. The course content will broadly cover the following topics: access control mechanisms; web security; wireless LAN security; mobile (GSM & UMTS) security; identity management. The aim in each of these sessions will be to concentrate on how the security services in the architectures are constructed from underlying technical mechanisms. In addition, we will consider how the implementation of these mechanisms are not always perfect in real world implementations, and how the business requirements of an organisation can impact how we implement security.
Syllabus
  • This course will cover a number of topics related to the design and implementation of security architectures. The course content will broadly cover the following topics: access control mechanisms; web security; wireless LAN security; mobile (GSM & UMTS) security; identity management. The aim in each of these sessions will be to concentrate on how the security services in the architectures are constructed from underlying technical mechanisms. In addition, we will consider how the implementation of these mechanisms are not always perfect in real world implementations, and how the business requirements of an organisation can impact how we implement security.
Literature
  • GUTMANN, Peter. Cryptographic security architecture : design and verification. Berlin: Springer, 2004, xviii, 320. ISBN 0387953876. info
Teaching methods
Seminars mainly with presentations from the lecturer, supplemented by discussions of problems and case studies with students.
Assessment methods
Colloquial discussion after the last lecture. Homework and active participation in the lectures shall be also considered.
Language of instruction
English
Follow-Up Courses
Further comments (probably available only in Czech)
Study Materials
The course is taught once in two years.
The course is taught: in blocks.
Note related to how often the course is taught: Od 18.4. Ut 16:00-20:00 a Pa 10:00-14:00, do 4.5.
The course is also listed under the following terms Spring 2009, Spring 2011, Spring 2013, Spring 2015, Spring 2018, Spring 2022, Spring 2023.

PV222 Security Architectures

Faculty of Informatics
Spring 2016

The course is not taught in Spring 2016

Extent and Intensity
3/1. 2 credit(s) (plus extra credits for completion). Type of Completion: k (colloquium).
Teacher(s)
Dr. Geraint Price (lecturer), prof. RNDr. Václav Matyáš, M.Sc., Ph.D. (deputy)
prof. RNDr. Václav Matyáš, M.Sc., Ph.D. (lecturer)
Guaranteed by
doc. RNDr. Eva Hladká, Ph.D.
Department of Computer Systems and Communications – Faculty of Informatics
Contact Person: prof. RNDr. Václav Matyáš, M.Sc., Ph.D.
Supplier department: Department of Computer Systems and Communications – Faculty of Informatics
Prerequisites
PV017 IT Security || PV079 Applied Cryptography || PV157 Authentication and AC || IV054 Cryptography and C.Protocols || SOUHLAS
Any of the following security/crypto courses: PV017||PV079||PV157||IV054
Course Enrolment Limitations
The course is also offered to the students of the fields other than those the course is directly associated with.
The capacity limit for the course is 30 student(s).
Current registration and enrolment status: enrolled: 0/30, only registered: 0/30, only registered with preference (fields directly associated with the programme): 0/30
fields of study / plans the course is directly associated with
there are 30 fields of study the course is directly associated with, display
Course objectives
This course will cover a number of topics related to the design and implementation of security architectures. The course content will broadly cover the following topics: access control mechanisms; web security; wireless LAN security; mobile (GSM & UMTS) security; identity management. The aim in each of these sessions will be to concentrate on how the security services in the architectures are constructed from underlying technical mechanisms. In addition, we will consider how the implementation of these mechanisms are not always perfect in real world implementations, and how the business requirements of an organisation can impact how we implement security.
Syllabus
  • This course will cover a number of topics related to the design and implementation of security architectures. The course content will broadly cover the following topics: access control mechanisms; web security; wireless LAN security; mobile (GSM & UMTS) security; identity management. The aim in each of these sessions will be to concentrate on how the security services in the architectures are constructed from underlying technical mechanisms. In addition, we will consider how the implementation of these mechanisms are not always perfect in real world implementations, and how the business requirements of an organisation can impact how we implement security.
Literature
  • GUTMANN, Peter. Cryptographic security architecture : design and verification. Berlin: Springer, 2004, xviii, 320. ISBN 0387953876. info
Teaching methods
Seminars mainly with presentations from the lecturer, supplemented by discussions of problems and case studies with students.
Assessment methods
Colloquial discussion after the last lecture. Homework and active participation in the lectures shall be also considered.
Language of instruction
English
Follow-Up Courses
Further comments (probably available only in Czech)
The course is taught once in two years.
The course is taught: in blocks.
Note related to how often the course is taught: Od 18.4. Ut 16:00-20:00 a Pa 10:00-14:00, do 4.5.
The course is also listed under the following terms Spring 2009, Spring 2011, Spring 2013, Spring 2015, Spring 2018, Spring 2022, Spring 2023.

PV222 Security Architectures

Faculty of Informatics
Spring 2014

The course is not taught in Spring 2014

Extent and Intensity
3/1. 2 credit(s) (plus extra credits for completion). Type of Completion: k (colloquium).
Teacher(s)
Dr. Geraint Price (lecturer), prof. RNDr. Václav Matyáš, M.Sc., Ph.D. (deputy)
prof. RNDr. Václav Matyáš, M.Sc., Ph.D. (lecturer)
Guaranteed by
doc. RNDr. Vlastislav Dohnal, Ph.D.
Department of Computer Systems and Communications – Faculty of Informatics
Contact Person: prof. RNDr. Václav Matyáš, M.Sc., Ph.D.
Supplier department: Department of Computer Systems and Communications – Faculty of Informatics
Prerequisites
PV017 IT Security || PV079 Applied Cryptography || PV157 Authentication and AC || IV054 Cryptography and C.Protocols || SOUHLAS
Any of the following security/crypto courses: PV017||PV079||PV157||IV054
Course Enrolment Limitations
The course is also offered to the students of the fields other than those the course is directly associated with.
The capacity limit for the course is 30 student(s).
Current registration and enrolment status: enrolled: 0/30, only registered: 0/30, only registered with preference (fields directly associated with the programme): 0/30
fields of study / plans the course is directly associated with
there are 29 fields of study the course is directly associated with, display
Course objectives
This course will cover a number of topics related to the design and implementation of security architectures. The course content will broadly cover the following topics: access control mechanisms; web security; wireless LAN security; mobile (GSM & UMTS) security; identity management. The aim in each of these sessions will be to concentrate on how the security services in the architectures are constructed from underlying technical mechanisms. In addition, we will consider how the implementation of these mechanisms are not always perfect in real world implementations, and how the business requirements of an organisation can impact how we implement security.
Syllabus
  • This course will cover a number of topics related to the design and implementation of security architectures. The course content will broadly cover the following topics: access control mechanisms; web security; wireless LAN security; mobile (GSM & UMTS) security; identity management. The aim in each of these sessions will be to concentrate on how the security services in the architectures are constructed from underlying technical mechanisms. In addition, we will consider how the implementation of these mechanisms are not always perfect in real world implementations, and how the business requirements of an organisation can impact how we implement security.
Literature
  • GUTMANN, Peter. Cryptographic security architecture : design and verification. Berlin: Springer, 2004, xviii, 320. ISBN 0387953876. info
Teaching methods
Seminars mainly with presentations from the lecturer, supplemented by discussions of problems and case studies with students.
Assessment methods
Colloquial discussion after the last lecture. Homework and active participation in the lectures shall be also considered.
Language of instruction
English
Follow-Up Courses
Further comments (probably available only in Czech)
The course is taught once in two years.
The course is taught: in blocks.
Note related to how often the course is taught: Od 18.4. Ut 16:00-20:00 a Pa 10:00-14:00, do 4.5.
The course is also listed under the following terms Spring 2009, Spring 2011, Spring 2013, Spring 2015, Spring 2018, Spring 2022, Spring 2023.

PV222 Security Architectures

Faculty of Informatics
Spring 2012

The course is not taught in Spring 2012

Extent and Intensity
3/1. 2 credit(s) (plus extra credits for completion). Type of Completion: k (colloquium).
Teacher(s)
Dr. Geraint Price (lecturer), prof. RNDr. Václav Matyáš, M.Sc., Ph.D. (deputy)
prof. RNDr. Václav Matyáš, M.Sc., Ph.D. (lecturer)
Guaranteed by
prof. RNDr. Luděk Matyska, CSc.
Department of Computer Systems and Communications – Faculty of Informatics
Contact Person: prof. RNDr. Václav Matyáš, M.Sc., Ph.D.
Supplier department: Department of Computer Systems and Communications – Faculty of Informatics
Prerequisites
PV017 IT Security || PV079 Applied Cryptography || PV157 Authentication and AC || IV054 Cryptography and C.Protocols || SOUHLAS
Any of the following security/crypto courses: PV017||PV079||PV157||IV054
Course Enrolment Limitations
The course is also offered to the students of the fields other than those the course is directly associated with.
The capacity limit for the course is 30 student(s).
Current registration and enrolment status: enrolled: 0/30, only registered: 0/30, only registered with preference (fields directly associated with the programme): 0/30
fields of study / plans the course is directly associated with
there are 34 fields of study the course is directly associated with, display
Course objectives
This course will cover a number of topics related to the design and implementation of security architectures. The course content will broadly cover the following topics: access control mechanisms; web security; wireless LAN security; mobile (GSM & UMTS) security; identity management. The aim in each of these sessions will be to concentrate on how the security services in the architectures are constructed from underlying technical mechanisms. In addition, we will consider how the implementation of these mechanisms are not always perfect in real world implementations, and how the business requirements of an organisation can impact how we implement security.
Syllabus
  • This course will cover a number of topics related to the design and implementation of security architectures. The course content will broadly cover the following topics: access control mechanisms; web security; wireless LAN security; mobile (GSM & UMTS) security; identity management. The aim in each of these sessions will be to concentrate on how the security services in the architectures are constructed from underlying technical mechanisms. In addition, we will consider how the implementation of these mechanisms are not always perfect in real world implementations, and how the business requirements of an organisation can impact how we implement security.
Assessment methods
Colloquial discussion at the end of the lectures = first week of May. Homework and active participation in the lectures shall be also considered.
Language of instruction
English
Follow-Up Courses
Further comments (probably available only in Czech)
The course is taught once in two years.
The course is taught: in blocks.
Note related to how often the course is taught: Od 18.4. Ut 16:00-20:00 a Pa 10:00-14:00, do 4.5.
The course is also listed under the following terms Spring 2009, Spring 2011, Spring 2013, Spring 2015, Spring 2018, Spring 2022, Spring 2023.
  • Enrolment Statistics (recent)