Teaching Responsibility

LJMU Schools involved in Delivery:

Computer Science and Mathematics

Learning Methods

Lecture

Seminar

Module Offerings

7108COMP-SEP-CTY

Aims

To allow students to develop advanced understanding of the complex information security concepts of identity and trust. The closely related problem of privacy will be explored in the context of identity and trust. By studying existing solutions for identity and trust in computer systems students will be able to propose their own design for a particular application.

Learning Outcomes

1.
Understand the complexity of the relationship between identity and trust.
2.
Demonstrate a critical awareness of how privacy intersects with identity and trust.
3.
Critically evaluate technology solutions for identity, trust and privacy.
4.
Show originality in the design of identity and trust solutions for applications.

Module Content

Outline Syllabus:Defining the concepts of identity and trust Identity and trust in the offline world Identity Theft Cryptographic solutions for identity and trust Public Key Infrastructure (PKI) Identity Management – Authorization, Authentication, Accounting (AAA) Directory Services Single Sign-On Protocols; WS-Security, OpenID, WS-Trust, SAML, OAuth Privacy; concepts, problems, legal status Privacy Enhancing Technologies (PETs) Anonymity – concepts, benefits and problems with anonymity TOR
Additional Information:The module approaches the difficult security problems of identity and trust through a mostly theoretical lens, but considers practical solutions in use by practitioners. The module ends with an in depth consideration of privacy and how it relates to identity and trust.

Assessments

Report