Deprecated: The each() function is deprecated. This message will be suppressed on further calls in /home/zhenxiangba/zhenxiangba.com/public_html/phproxy-improved-master/index.php on line 456
Distributed E-business Techniques (DEBT, 211081)
[go: Go Back, main page]

Distributed E-business Techniques (DEBT, 211081)


The Distributed E-Business Techniques (DEBT) course discusses a number of important enabling technologies for E-business. Adequate knowledge of the state of the art in the area will enable to the student to appreciate the strengths and weaknesses of the many solutions that are currently under development and on the market. The DEBT course is primarily intended for MSc students, but would be appropriate also for 3rd year BSc students.

Organisation

Language: The class is taught in English.
Lecturers: Prof Dr Pieter Hartel, Dr Jeroen Doumen, and Ricardo Corin.
Time and venue: ?
Class of 2004/2005 Excel
Book: Developing Distributed and E-Commerce Applications html
Assesment: Written examination: 50%; Writing a 6 page anonymous paper and peer review: 50%
Mini-conference: call for papers Word and review form Word
Anonymous peer review results Excel and forms Word

Student questionnaire Word
2003/2004 evaluation results html, (also available 2002/2003 evaluation results html, 2001/2002 evaluation results html)
Course information from vist html

Prerequisites

Java and discrete mathematics (or equivalent).

Objectives

1. Design and implement a simple E-business application
2. Have a good appreciation of security in E-business
3. Have experienced relevant techniques such as digital assets management, biometrics, smart cards, and protocol verification
4. Have experienced the process of writing and peer reviewing an academic paper

Contents

1. Cryptography
2. Security protocol verification
3. Digital assets management
4. Smart cards and the JavaCard framework
5. Biometrics
6. Java safety and security

Notes and slides for each week

  1. Introduction
    Slides Powerpoint
    C. Schulze and J. Baumgartner. Don't Panic! Do E-commerce -- A Beginner's Guide to European Law Affecting E-commerce, European Commission's Electronic Commerce Team (Information Society Directorate General)
    Booklet PDF

  2. Cryptography (1)
    A. J. Menezes, P. C. Van Oorschot, S. A. Vanstone. Handbook of Applied Cryptography, (CRC Press Series on Discrete Mathematics and Its Applications) Chapter 1: in full.
    Chapter 7: paragraphs 1-4.
    Chapter 8: paragraphs 1-2.
    Chapter 9: paragraphs 1-3
    Book PDF and PostScript
    Slides on "Symmetric cryptography" Powerpoint by Jaap-Henk Hoepman

  3. Cryptography (2)
    Slides on "Asymmetric cryptography" Powerpoint by Jaap-Henk Hoepman

  4. Biometrics
    A. Jain, L. Hong, S. Pankanti. Biometric identification, Communications of the ACM, Volume 43, Issue 2 (February 2000), pp 91-98.
    Paper ACM digital Library
    Slides PowerPoint

    N. J. Henderson and P. H. Hartel. Pressure sequence - a novel method of protecting smart cards, In J. Domingo-Ferrer, D. Chan, and A. Watson, editors, 4th Int. IFIP wg 8.8 Conf. Smart card research and advanced application (CARDIS), pages 241-256, Bristol, UK, Sep 2000. Kluwer Academic Publishers, Boston/Dordrecht/London.
    Paper PDF
    Slides PowerPoint

  5. Smart Cards
    K. M. Shelfer, J. D. Procaccino. Smart Card Evolution, Communications of the ACM, Volume 45, Issue 7 (July 2002), pp 83-88.
    Paper ACM Digital Library
    D. Huseman. The smart card: don't leave home without it IEEE Concurrency, Volume 7, Issue 2, pp 24-27 (April 1999)
    Paper IEEE digital library
    Slides PowerPoint

    Z. Chen. Java Card Technology for Smart Cards, Addison Wesley, Reading, Massachusetts, 2000
    Chapters 3 and 9 HTML
    Slides PowerPoint

  6. Digital Rights Management
    F. Hartung, F. Ramme. Digital rights management and watermarking of multimedia content for M-commerce applications, IEEE Communications Magazine, 38(11): 78-84, Nov. 2000
    Paper IEEE digital library
    Slides PowerPoint

    C. N. Chong, R. van Buuren, P. H. Hartel, and G. Kleinhuis. Security Attribute Based Digital Rights Management. In: Joint Int. Workshop on Interactive Distributed Multimedia Systems / Protocols for Multimedia Systems (IDMS/PROMS), F. Boavida E. Monteiro J. Orvalho (eds.), pages 339-352, Coimbra, Portugal, LNCS 2515, Springer-Verlag, Berlin, Nov. 2002
    Paper PDF
    Slides PowerPoint

    Payment Protocols
    N. Asokan, Ph. Janson, M. Steiner, M. Waidner. State of the art in electronic payment systems, in: Advances in Computers, Volume 43, M. V. Zelkowitz (ed.) pp. 425-449, Academic Press, Mar. 2000.
    Paper NECI Scientific Digital Library
    Slides PowerPoint

  7. Security protocols (1)
    J. Millen, V. Shmatikov. Constraint solving for bounded-process cryptographic protocol analysis, In 8th ACM Conference on Computer and Communication Security, page 166-175, ACM Press, New York
    Paper ACM Digital Library
    Slides on "Security Protocols" part 1 Powerpoint by Sandro Etalle and Ricardo Corin

  8. Security protocols (2)
    R. Corin, S. Etalle. An Improved Constraint-Based System for the Verification of Security Protocols, In 9th Int. Symp. on Static Analysis, LNCS 2477, pages 326-341, Springer Verlag, Berlin
    Paper Springer Digital Library, or here
    Slides on "Security Protocols" part 2 Powerpoint by Sandro Etalle and Ricardo Corin

    On line demo and resources here

  9. date? Half day Mini conference

  10. date? Written Examination (Open book)
    Past exam papers:

  11. date? Resit (Written Examination, Open book, Second and last opportunity in 2004)
    Past exam papers: