Course content
- Protection in Networked Systems: background, motivation, challenges
- Trust (Computational Trust): models and mechanisms
- Trust (Computational Trust): application in PKI, Cloud Computing, Reputation Systems, and Web Services
- Trust: regret management and device comfort
- Privacy: privacy definitions, models, data anonymity, communication anonymity
- Privacy & Trust: privacy-preserving trust models, mechanisms, and application to IDM
- Resilience: models, network intrusion detection systems, collaborative intrusion detection systems, honeypots, botnets
This lecture covers important topics which are part of the current research in the collaborative research center and CROSSING GRK-2050.
Teaching Staff
Name | Working area(s) | Contact | |
---|---|---|---|
| Prof. Dr. Max Mühlhäuser | max@tk.tu-... +49 6151 16-23200 S2|02 A114 | |
| Sheik Mahbub Habib Dr. | sheikh@tk.tu-... +49 6151 16- 23199 | |
| Dr. Florian Volk | ||
| Dr. Jörg Daubert | D.4 | daubert@tk.tu-darmstadt +49 6151 16-23191 S2|02 A121 |
| Emmanouil Vasilomanolakis Ass.-Prof. Dr. | B.3 | emv@es.aau.dk |