Protection in Networked Systems ‒ Trust, Resilience, and Privacy

Course content

  • Protection in Networked Systems: background, motivation, challenges
  • Trust (Computational Trust): models and mechanisms
  • Trust (Computational Trust): application in PKI, Cloud Computing, Reputation Systems, and Web Services
  • Trust: regret management and device comfort
  • Privacy: privacy definitions, models, data anonymity, communication anonymity
  • Privacy & Trust: privacy-preserving trust models, mechanisms, and application to IDM
  • Resilience: models, network intrusion detection systems, collaborative intrusion detection systems, honeypots, botnets

This lecture covers important topics which are part of the current research in the collaborative research center CROSSING and GRK-2050.

Teaching Staff

  Name Working area(s) Contact
Prof. Dr. Max Mühlhäuser
+49 6151 16-23200
S2|02 A114
Sheik Mahbub Habib Dr.
+49 6151 16- 23199
Dr. Florian Volk
Dr. Jörg Daubert
+49 6151 16-23191
S2|02 A121
Emmanouil Vasilomanolakis Ass.-Prof. Dr.

The integrated lecture Protection in Networked Systems ‒ Trust, Resilience, and Privacy covers the topics of computational trust, resilient and anonymous networks, and collaborative defense mechanisms. By attending this course, the students will be able to understand the problems and solutions in the context of networked systems. The course content will consider the concept of End-to-End systems emphasizing on users, devices, networks, and applications or services.

The examination will be either performed as

  • a written exam (more than 15 students)
  • an oral examination (up to 15 students)

An announcement will be made once the number or registered students is fixed.

Knowledge of IT Security and Mathematics according to 1-4 semester of B.Sc. Computer Science

  • Trust and Reputation for Service-Oriented Environments: Technologies For Building Business Intelligence And Consumer Confidence, Elizabeth Chang, Tharam Dillon, and Farookh K. Hussain, 374 pages, 2006. ISBN: 978-0-470-01547-6
  • Detailing Reviews and Ratings for Trust-Enhanced Composition, Florian Volk, 272 pages, 2015, ISBN: 9783736991668 (print), 9783736981669 (e-book)
  • On anonymity in an electronic society: A survey of anonymous communication systems, Matthew Edman and Bülent Yener, ACM Computing Surveys, Vol. 42, Issue 1, 2009.
  • Taxonomy and Survey of Collaborative Intrusion Detection, Emmanouil Vasilomanolakis, Shankar Karuppayah, Max Mühlhäuser, Mathias Fischer, ACM Computing Surveys, Vol. 47 Issue 4, 2015.
  • Selected book chapters and scientific publications