Formal Methods for Information Security (Lecture with Exercises, Summer Term 2008)

Lecturer: Prof. Heiko Mantel

Format: V4 + Ü2

Place and Time:

  • Tuesday, 9:50 - 11:30, Lecture in S2/02-C110
  • Tuesday, 11:40 - 13:20, Exercises in S2/02-C110
  • Thursday, 9:50 - 11:30, Lecture in S2/02-C110

The lecture starts on Thursday, 03.04.2008.

Exam:

  • Midterm: 13.5.2008, 9:50-11:30, S2-02-C110
  • Final: 1.7.2008, 9:50-11:30, S2-02-C110

Content: 

The course gives an overview on formal approaches to:

  • formal modeling of security-critical systems
  • formal specification of security requirements
  • formal security analysis of systems 
  • theoretical foundations for developing secure software by stepwise refinement and composition.


The topics covered include:

  • introduction to formal methods for information security
  • formal modeling and analysis of access control mechanisms
  • formal modeling and analysis of information flow control
  • formal modeling and analysis of security protocols
  • formal modeling of trust relationships in distributed systems

Prerequisites:

Knowledge of Computer Science and Mathematics, equivalent to the first four Semesters in the Computer Science Bachelor program, in particular

  • ability to use formal languages and calculi
  • and basic knowledge about logic.

Literature:

Scientific articles (to be announced in the lecture) and slides of the lectures (will be available online after the lecture). Additionally, e.g., one of the following books:

  • M. Bishop: "Computer Security", Pearson Education, 2003. 
  • D. Gollmann: "Computer Security", Wiley, 2000.
  • D. Denning: "Cryptography and Data Security", Addison Wesley,  1982 (out of print, but still available on the internet)
A A A | Print | Imprint | Sitemap | Contact
zum Seitenanfang