When you enroll in this course, you'll also be enrolled in this Specialization.
Learn new concepts from industry experts
Gain a foundational understanding of a subject or tool
Develop job-relevant skills with hands-on projects
Earn a shareable career certificate
There are 4 modules in this course
In this MOOC, we learn RBAC and ABAC access control to facilitate the specification and management of access policies. We learn examples of how RBAC is supported by modern systems such as Docker and AWS IAM. We learn XACML 3.0 and an ABAC implementation for controling secure access to web documents and network resources with attribute certificates, and XACML architecture components. We show how to exhance the data security with GeoEncryption, Secure Enhanced Geolocking, and R2D2 concepts which deliver data to right places via right path. We show how Google Map and Web Crytpo
API can be integrated for encrypted document on web browser without download apps and associate them with geolocking area to restrict unauthorize and improper accesses.
In this module, we discuss the geoencryption techniques, the issues in the design and analysis of a Secure Enhanced Geolocking system for protected encrypted info with geolocking. We learn the web based implementation of an Secure Enhancing Geolocking system using Javascript with Google Map API and CryptoJS API.
Read the seminal location based encryption paper by Scott Logan and Dorothy E. Denning.•60 minutes
Get help and meet other learners in this course. Join your discussion forums!•5 minutes
Read SEG master project report by Ashish Korpe•60 minutes
4 assignments•Total 64 minutes
L1.1 Practice Quiz•10 minutes
L1.2. Practice Quiz•15 minutes
L1.3. Practice Quiz•9 minutes
Quiz: M1 quiz•30 minutes
1 peer review•Total 60 minutes
Design and Analysis of Secure Data Delivery Based on Geo Information•60 minutes
1 discussion prompt•Total 15 minutes
Enhance Data Security by Integrating GeoEncryption and Secure Enhanced Geolocking.•15 minutes
Enhance Security with Network and Context Information
Module 2•3 hours to complete
Module details
In this module, we learn the techniques for using WiFi or BLE signals to estimate the geolocation of a user. We also show the technique where the value added Software Defined Network services can be used to ensure the data are delivered through a designated path to the right location.
What's included
3 videos3 readings4 assignments
Show info about module content
3 videos•Total 14 minutes
Verify User Location Using WiFi System•5 minutes
Location Verification Using Bluetooth Low Energy Devices•5 minutes
Right Path Right Place Data Delivery•4 minutes
3 readings•Total 100 minutes
Read the following papers related to Right Place Verification•30 minutes
Read paper on using RSSI measurement of BLE devices for localization•30 minutes
Read R2D2 paper on BLE location verification and SDN Data Path Confidence Analysis•40 minutes
4 assignments•Total 60 minutes
L2.1 Practice Quiz•9 minutes
L2.2. Practice Quiz•12 minutes
L2.3 Practice Quiz•9 minutes
M2 quiz•30 minutes
Authentication and Role Based Access Control
Module 3•4 hours to complete
Module details
In this module, we discuss the definition of the authentication, the types of authentication credentials, and the authentication process and related requirements. we learn the Role Based Access Control, short for RBAC, which is an security approach to restricting system access to authorized users and to help specify organization's security policies reflecting its organizational structure. We use Docker Universal Control Plan and AWS IAM access control as examples for illustrating how RBAC simplifies the access control specification and management.
What's included
4 videos4 readings4 assignments
Show info about module content
4 videos•Total 24 minutes
Authentication Credentials•7 minutes
Digital Certificate Creation•7 minutes
Role Based Access Control (RBAC)•4 minutes
RBAC Examples: Docker UCP and AWS IAM•5 minutes
4 readings•Total 105 minutes
Watch OAuth presentation.•60 minutes
Read how digital certificates are created for secure web access•15 minutes
Reading assignments for RBAC.•20 minutes
Read Docker and AWS RBAC support example.•10 minutes
4 assignments•Total 120 minutes
L3.1 Practice Quiz•30 minutes
L3.2 Practice Quiz•30 minutes
L3.3 Practice Quiz•30 minutes
M3 Quiz•30 minutes
Authorization and Attribute Based Access Control
Module 4•3 hours to complete
Module details
In this module, we discuss PMI Privilege Management Infrastructure for managing the authorization of privileges within a system. We use attribute certificates as an instrument to associate access rights of the resources/services in the system to the identities or roles of the intended users of the system. We compare the differences between the PKI, the public key infrastructure which is focused on identity management, with the PMI which is focused on the management of the privileges authorized for users. We discuss their difference usages for the access control of the system. We then present the XACML, which is an eXtensible Access Control Markup Language (XACML) for specifying policies. It is an attribute-based access control system (ABAC), where attributes associated with a user or action or resource are inputs into the decision of whether a given user may access a given resource in a particular way. An implementation of ABAC system using Sun’s XACML 2.0 Java reference implementation called ENFORCE is then presented as an example.
What's included
4 videos3 readings4 assignments
Show info about module content
4 videos•Total 23 minutes
Privilege Management Infrastructure and Attribute Certificates•8 minutes
eXtensible Access Control Markup Language (XACML)•5 minutes
Attribute Based Access Control•5 minutes
Enforce Testbed as an ABAC Example•6 minutes
3 readings•Total 100 minutes
Read the following paper which utilize attribute certificates for secure information sharing.•60 minutes
Read key sections of OASIS Standard XACML version 3.0•20 minutes
Read Osama Khaleel's master thesis on Implementing an ABAC system with XACML 2.0•20 minutes
4 assignments•Total 82 minutes
L4.1 Practice Quiz•30 minutes
L4.2 Practice Quiz•16 minutes
Quiz L4.3 Practice Quiz•6 minutes
M4 Quiz•30 minutes
Earn a career certificate
Add this credential to your LinkedIn profile, resume, or CV. Share it on social media and in your performance review.
Instructors
Instructor ratings
Instructor ratings
We asked all learners to give feedback on our instructors based on the quality of their teaching style.
The University of Colorado is a recognized leader in higher education on the national and global stage. We collaborate to meet the diverse needs of our students and communities. We promote innovation, encourage discovery and support the extension of knowledge in ways unique to the state of Colorado and beyond.
When will I have access to the lectures and assignments?
To access the course materials, assignments and to earn a Certificate, you will need to purchase the Certificate experience when you enroll in a course. You can try a Free Trial instead, or apply for Financial Aid. The course may offer 'Full Course, No Certificate' instead. This option lets you see all course materials, submit required assessments, and get a final grade. This also means that you will not be able to purchase a Certificate experience.
What will I get if I subscribe to this Specialization?
When you enroll in the course, you get access to all of the courses in the Specialization, and you earn a certificate when you complete the work. Your electronic Certificate will be added to your Accomplishments page - from there, you can print your Certificate or add it to your LinkedIn profile.
Is financial aid available?
Yes. In select learning programs, you can apply for financial aid or a scholarship if you can’t afford the enrollment fee. If fin aid or scholarship is available for your learning program selection, you’ll find a link to apply on the description page.