Teaching Responsibility
LJMU Schools involved in Delivery:
Computer Science and Mathematics
Learning Methods
Lecture
Seminar
Module Offerings
7108COMP-SEP-CTY
Aims
To allow students to develop advanced understanding of the complex information security concepts of identity and trust. The closely related problem of privacy will be explored in the context of identity and trust. By studying existing solutions for identity and trust in computer systems students will be able to propose their own design for a particular application.
Learning Outcomes
1.
Understand the complexity of the relationship between identity and trust.
2.
Demonstrate a critical awareness of how privacy intersects with identity and trust.
3.
Critically evaluate technology solutions for identity, trust and privacy.
4.
Show originality in the design of identity and trust solutions for applications.
Module Content
Outline Syllabus:Defining the concepts of identity and trust
Identity and trust in the offline world
Identity Theft
Cryptographic solutions for identity and trust
Public Key Infrastructure (PKI)
Identity Management – Authorization, Authentication, Accounting (AAA)
Directory Services
Single Sign-On
Protocols; WS-Security, OpenID, WS-Trust, SAML, OAuth
Privacy; concepts, problems, legal status
Privacy Enhancing Technologies (PETs)
Anonymity – concepts, benefits and problems with anonymity
TOR
Additional Information:The module approaches the difficult security problems of identity and trust through a mostly theoretical lens, but considers practical solutions in use by practitioners. The module ends with an in depth consideration of privacy and how it relates to identity and trust.