Specialization complementary (Computer Networks and Distributed Systems)
This subject has not requirements
This subject covers research aspects of the very active area of Internet applications and its security. Focus is made on multimedia applications, but other areas, such as eHealth, are also considered. Therefore, content, metadata and transmission protocols are relevant.
Protection and privacy are considered for information and protocols, so all aspects of Internet security for applications will be reviewed.
Standards to achieve interoperability are key for understanding the relevant problems and their solutions.
Topics will be introduced, analyzed and discussed, focusing on the new approaches and techniques. Students will work on specific assignments that will be discussed with their peers in order to understand current solutions and think on alternative ones.
Person in charge
Jaime M. Delgado Merce (
Technical Competences of each Specialization
Computer networks and distributed systems
CEE2.1 - Capability to understand models, problems and algorithms related to distributed systems, and to design and evaluate algorithms and systems that process the distribution problems and provide distributed services.
Generic Technical Competences
CG1 - Capability to apply the scientific method to study and analyse of phenomena and systems in any area of Computer Science, and in the conception, design and implementation of innovative and original solutions.
CG4 - Capacity for general and technical management of research, development and innovation projects, in companies and technology centers in the field of Informatics Engineering.
CG5 - Capability to apply innovative solutions and make progress in the knowledge to exploit the new paradigms of computing, particularly in distributed environments.
CTR4 - Capability to manage the acquisition, structuring, analysis and visualization of data and information in the area of informatics engineering, and critically assess the results of this effort.
CTR6 - Capacity for critical, logical and mathematical reasoning. Capability to solve problems in their area of study. Capacity for abstraction: the capability to create and use models that reflect real situations. Capability to design and implement simple experiments, and analyze and interpret their results. Capacity for analysis, synthesis and evaluation.
CB8 - Capability to communicate their conclusions, and the knowledge and rationale underpinning these, to both skilled and unskilled public in a clear and unambiguous way.
Security in applications
Threads and mechanisms
PKI (Public Key Infrastructure)
Security in application protocols
XML and security: Encryption, Signature
Specific security protocols: SAML, OAuth
Internet applications privacy
Intellectual rights for multimedia content
Security and privacy in eHealth
New approaches: Blockchain, Quantum security,
The course is very interactive with some introductory topics from the Professor and a few assignments in which students present papers and discuss conclusions.
In particular, students prepare two assignments for analysis and discussion on topics of recent research and standards, and another one more on research.
In the first two assignments, students present the results of their analysis and lead a discussion on this with rest of students.
In the last one, students make a small research project led by the Professor (on a specific topic: what is done? what is not solved? ideas to solve it). They write a short paper and make a presentation where they answer questions and criticisms from the Professor and the other students.
Test on the topics developed by the Professor (T).
2 assignments on analysis and discussion (A) and 1 assignment on research (R).
(A) Analysis & Discussion of a document. Students provide documentation + short presentation and lead class discussion. Students not presenting should make questions showing their understanding of the topics.
(R) Research work. Students provide documentation + long presentation + interview (if needed).
Final mark: (T * 0,3) + 2* (A * 0,2) + (R * 0,3)
Assessment of A includes:
Content (35%), Presentation (30%), Lead discussion (20%), Others' discussion (15%).
Assessment of R includes:
Content (35%), Presentation (25%), Questions (15%), Report (25%).
T mark could be increased (factor F) with the evaluation of n (number to define) dairy short tests (mark D for every dairy test):
Increase factor (F) = 0,25 * ( Σn Di )/ n
The increased T mark would be: T * (1+F). 0 <= F <= 0,25.
Computer Security: Principles and Practice, Third Edition -
2014. ISBN: 978-0133773927
Where we are
B6 Building Campus Nord
C/Jordi Girona Salgado,1-3
08034 BARCELONA Spain
Tel: (+34) 93 401 70 00