Credits
6
Types
Specialization complementary (Computer Networks and Distributed Systems)
Requirements
This subject has not requirements
, but it has got previous capacities
Department
AC
Protection and privacy are considered for information and protocols, so all aspects of Internet security for applications will be reviewed.
Standards to achieve interoperability are key for understanding the relevant problems and their solutions.
Topics will be introduced, analyzed and discussed, focusing on the new approaches and techniques. Students will work on specific assignments that will be discussed with their peers in order to understand current solutions and think of other alternatives.
Teachers
Person in charge
- Jaime M. Delgado Merce ( jaime@ac.upc.edu )
Others
- Silvia Llorente Viejo ( silvia.llorente@upc.edu )
Weekly hours
Theory
3.6
Problems
0
Laboratory
0
Guided learning
0
Autonomous learning
7.51
Competences
Computer networks and distributed systems
Generic
Information literacy
Reasoning
Basic
Objectives
Contents
-
Introduction
Subject introduction.
Application layer.
Web: HTTP.
XML (eXtensible Markup Language).
Standardization. -
Security in applications
Threats and mechanisms.
Cryptography.
PKI (Public Key Infrastructure).
Security and Privacy by Design.
Security in application layer protocols.
Security in formats (XML, JSON): Encryption, Signature.
Specific security protocols: SAML, OAuth, JWT.
Internet applications privacy, access control
Example in eHealth.
Security in multimedia content (DRM). -
Multimedia content
Life cycle.
Content architectures.
Content types: Characters, Audio, Images, Video.
Containers.
Metadata. -
Multimedia content transmission
HTML5 support to multimedia transmission.
Streaming protocols.
Streaming with HTTP.
DASH.
Activities
Activity Evaluation act
Theory
6h
Problems
0h
Laboratory
0h
Guided learning
0h
Autonomous learning
6h
Theory
4h
Problems
0h
Laboratory
0h
Guided learning
0h
Autonomous learning
4h
Teaching methodology
The course is very interactive with some introductory topics from the Professor and a few assignments in which students present papers and discuss conclusions.In particular, students prepare one assignment for analysis and discussion on specific advanced topics or standards, and another one more on research.
In the first assignment, students present the results of their analysis and lead a discussion on this with rest of students.
In the second one, students make a small research project led by the Professor (on a specific topic: what is done? what is not solved? ideas to solve it). They write a short paper and make a presentation where they answer questions and criticisms from the Professor and the other students.
Evaluation methodology
Tests on the topics developed by the Professor (T1 and T2).An assignment on analysis and discussion (A) and an assignment on research (R).
(A) Analysis & Discussion of a document or topic. Students provide documentation + short presentation and lead class discussion. Students not presenting should make questions showing their understanding of the topic.
(R) Research work. Students provide documentation + long presentation + interview (if needed).
Final mark: (T1 * 0,2) + (A * 0,3) + (R * 0,3) + (T2 * 0,2)
Assessment of A includes:
Content (35%), Presentation (30%), Lead discussion (20%), Others' discussion (15%).
Assessment of R includes:
Content (35%), Presentation (25%), Questions (15%), Report (25%).
T1 and T2 marks could be increased (factor F) with the evaluation of n (number to define) dairy short tests (mark D for every dairy test):
Increase factor (F) = 0,25 * ( Σn Di )/ n
The increased Ti mark would be: Ti * (1+F). 0 <= F <= 0,25.
Bibliography
Basic
-
Computer security: principles and practice
- Stallings, W.; Brown, L,
Pearson Education,
2018.
ISBN: 9781292220611
https://discovery.upc.edu/discovery/fulldisplay?docid=alma991004175229706711&context=L&vid=34CSUC_UPC:VU1&lang=ca -
Slides
- Delgado, Jaime,
2021.