Approved
|
Pending +
|
DueDate
|
5 June 2017 +
|
Methods
|
The tools and methods in this thesis are b … The tools and methods in this thesis are based on
* A set of scenario, describing the challenges
* A list of requirements being extracted from the scenarios
* A description and evaluation of technologies and tools being candidates for solutions
* A functional architecture/description of the envisaged system
* An implementation of the core concepts
* A demonstration of the solution
* An evaluation of the solution, including a critical review of the descisions taken earlier
* Conclusions
* Referencess taken earlier
* Conclusions
* References +
|
Objective
|
Previous work has established a Multi-Metr … Previous work has established a Multi-Metrics (MM) Method for the analysis of measurable security and privacy. This MM approach is used in a.o. [[UNIK4750]], and described more in [[IoTSec:T1.2]]. Some challenges of the method are related to the choice of metrics describing security functionality and their impact of the system. A further potential weakness is the dependency of system components, called "interconnection".
Interconnection between the components for a given system has an impact on the security level of this system. In this thesis, the student will investigated and apply a proposed solution for the evaluation of this impact and the integration of it into system`s security level. For applying the proposed solution the student will develop new functionalities for already initiated framework.onalities for already initiated framework. +
|
Pre-Knowledge
|
This thesis includes a reasonable amount of programming and IT security terminologies. Thus it is expected that the student has the basic knowledge in (java and java script) and IT security. +
|
Schedule
|
The envisaged time schedule (for a long th … The envisaged time schedule (for a long thesis/60 ECTS) is:
:T0 0 starting month, T0+m denotes the month where the contribution to a certain chapter shalle be finalized
:T0+2 months: create an initial page describing the scenario
:T0+3: Provide a list of technologies which you think are necessary for the thesis
:T0+4: Establish the table of content (TOC) of the envisaged thesis. Each section shall contain 3-10 keywords describing the content of that section
:T0+7: Provide a draft of section 2 (scenario) and 3 (technologies)
:T0+10: Establish a draft on what to implement/architecture
:T0+11: Set-up an implementation, testing and evaluation plan
:T0+15: Evaluate your solution based on a set of parameters, keep in mind <i>there is no such thing as a free lunch</i>
:T0+17: Deliver the thesislunch</i>
:T0+17: Deliver the thesis +
|
Supervisor
|
Josef Noll +
, Seraj Fayyad +
|
ThesisStatus
|
Obsolete +
|
Titel
|
Evaluation of the Component`s Interconnection Impact on the System Security +
|
User
|
N.n. +
|
Creation dateThis property is a special property in this wiki.
|
18 August 2016 14:26:54 +
|
Categories |
Thesis +
|
Modification dateThis property is a special property in this wiki.
|
29 October 2018 09:57:40 +
|