UP | HOME
a_software.gif
tercer_nivel_software.gif

UPM / IMDEA Track in Software Development through Rigorous Methods

Reading group on computer security I

Coordinator(s)/Instructor(s)

Length

3 credits (ECTS) (bi-weekly meeting)

Prerequisites

Knowledge on the basic principles of computer security. An undergraduate level course on computer security is desired but not required.

This course has specific requirements, and if your initial level is not adequate, you may not pass. Therefore, we ask you to please include it in the mail you ought to send to graduate.school (at) software.imdea.org with the list of courses you want to take from the IMDEA track. You will receive a mail stating the courses in which you are welcome to enroll. If you enroll in an IMDEA Track course for which you did not receive explicit approval, you may be asked to switch over to a different one.

Summary and objectives

This course will focus on reading and presentation of research papers in the area of computer security. The research paper will encompass both foundational papers, i.e., those that laid the basis for current security techniques and defenses, as well as research papers on contemporary computer security research topics. The papers will encompass the sub-areas of applied cryptography, systems security, and software security.

Students taking this course will:

  1. Be exposed to research literature.
  2. Gain experience in critical reading, including identifying the contributions and limitations of proposed approaches.
  3. Develop skills for delivering effective technical presentations.
  4. Gain a background on key past research results that have laid the foundations of the area, as well as current topics of research interest.

Topics

Will be selected based on latest research topics, as well as the background of the students.

Evaluation

Evaluation will be based on the student's ability to perform critical reading, the paper presentations, and the student's overall involvement in the course.

Recommended reading

Will be decided based on the selected topics.




Back to the initial page
Go to the IMDEA Software Institute page

Fractals are used with permission from their author Cory Ench | © 2006-2007. IMDEA Software.
All rights reserved | Legal Notice | Privacy Policy