Difference between revisions of "TEK5530"

From its-wiki.no
Jump to: navigation, search
Line 11: Line 11:
 
* Establish application-driven security goals as well as the semantics of your system
 
* Establish application-driven security goals as well as the semantics of your system
 
* Generate matrices to describe the security impact of components and sub-systems, and perform a multi-metrics analysis to establish the system security
 
* Generate matrices to describe the security impact of components and sub-systems, and perform a multi-metrics analysis to establish the system security
* Analyze application goal versus system security and suggest improvements
+
* Analyse application goal versus system security and suggest improvements
 
|ResearchArea=Security
 
|ResearchArea=Security
 
|Type of course=Master
 
|Type of course=Master
Line 20: Line 20:
 
=Info=
 
=Info=
 
* This course is a Master course.
 
* This course is a Master course.
* The course takes place on Fridays, 0900-1200h at UNIK. A video communication is available to Ifi, Room Scheme@Ifi.UiO.no (room 1251).
+
* The course takes place on Fridays, 0900-1200h at UNIK. A video communication is available to Ifi, Room Scheme@Ifi.UiO.no (room 1251), see check: [[Video_conference]]
 
* We'll have video streaming: mms://lux.unik.no/308  
 
* We'll have video streaming: mms://lux.unik.no/308  
 
* The course is built up on three parts
 
 
* Evaluation is based on a presentation of topics and the implementation of your scenario.
 
* Evaluation is based on a presentation of topics and the implementation of your scenario.
  
Line 31: Line 29:
 
== Introduction into Internet of Things (IoT)  ==
 
== Introduction into Internet of Things (IoT)  ==
 
This first part will provide the  ...
 
This first part will provide the  ...
 +
* Provide industrial examples, e.g. Smart Grid and automatic meter readings
 +
 +
== Machine-readable Security Description ==
 
* Describing Security and Security Functionality in a semantic way
 
* Describing Security and Security Functionality in a semantic way
  
* Principles of service oriented architecture and semantic service delivery
+
== Application-driven security goals ==
* Protocols for service delivery in wireless radio networks
+
* Establish application-driven security goals as well as the semantics of your system
* Approaches for mobile and proximity service inclusion in a semantic SOA environment
+
* Practical experiences in building ontologies for user preferences, context description and service capability description
+
 
+
After the course, you will have gained an understanding of the state-of-the-art research in the area of mobile semantic service delivery. The compulsory tasks will will help the participants to improve scientific reading and presentation capabilities  and programming expertise.
+
== Earlier Lectures ==
+
{{#ask: [[Category:{{PAGENAME}}]][[Date::<{{CURRENTYEAR}}]]
+
| ?Date
+
| sort=Date
+
| order=desc
+
| format=table
+
| intro= '''Earlier lectures''' &#10;
+
}}
+
 
+
  
 +
== Perform Mulit-Metrics Analysis ==
 +
* Generate matrices to describe the security impact of components and sub-systems, and perform a multi-metrics analysis to establish the system security
 +
* Analyze application goal versus system security and suggest improvements
  
 
= Lecture overview with keywords =
 
= Lecture overview with keywords =
Line 60: Line 51:
  
  
= Video conferencing =
 
For details on video conferencing, check: [[Video_conference]]
 
]
 
 
[[Category:UNIK4750]]
 
[[Category:UNIK4750]]
___SHOWFACTBOX___
 

Revision as of 15:33, 23 November 2015

TEK5530 - Measurable Security for the Internet of Things


TEK5530
News Lectures on Fridays 0900-1200h, starting from 23Jan2016. The course is given at UNIK (Room 308b), with video communication to Room Scheme@Ifi.UiO.no (1251)
Organisation UNIK
by Josef Noll, György Kálmán
Course.png
Keywords


Abstract The course provides a methodology for measurable security, privacy, and dependability of industrial systems. Based on e.g. a smart grid example we will establish and develop the methodology to perform a multi-metrics analysis from components to sub-systems to systems. The course will allow you to compare security-related application goals with the results from the system analysis.
Objective (max 350 words) After completing the course you will be able to:
  • Describe application-driven security and establish challenges of sensor-driven systems
  • Provide industrial examples, e.g. Smart Grid and automatic meter readings
  • Establish application-driven security goals as well as the semantics of your system
  • Generate matrices to describe the security impact of components and sub-systems, and perform a multi-metrics analysis to establish the system security
  • Analyse application goal versus system security and suggest improvements
Keywords Security, Network Security, Sensor Security, Sensor networks
Research Area(s) Security
Type of course Master

Upload TEK5530.png to see a course picture instead of the banner picture. Edit the page by Special:FormEdit/Course/TEK5530.


To add new lectures, use: Add a lecture

Info

  • This course is a Master course.
  • The course takes place on Fridays, 0900-1200h at UNIK. A video communication is available to Ifi, Room Scheme@Ifi.UiO.no (room 1251), see check: Video_conference
  • We'll have video streaming: mms://lux.unik.no/308
  • Evaluation is based on a presentation of topics and the implementation of your scenario.


Topics

The course has the following parts

Introduction into Internet of Things (IoT)

This first part will provide the ...

  • Provide industrial examples, e.g. Smart Grid and automatic meter readings

Machine-readable Security Description

  • Describing Security and Security Functionality in a semantic way

Application-driven security goals

  • Establish application-driven security goals as well as the semantics of your system

Perform Mulit-Metrics Analysis

  • Generate matrices to describe the security impact of components and sub-systems, and perform a multi-metrics analysis to establish the system security
  • Analyze application goal versus system security and suggest improvements

Lecture overview with keywords