- Level Foundation
- المدة 15 ساعات hours
- الطبع بواسطة University of Colorado System
-
Offered by
عن
In this MOOC, we learn RBAC and ABAC access control to facilitate the specification and management of access policies. We learn examples of how RBAC is supported by modern systems such as Docker and AWS IAM. We learn XACML 3.0 and an ABAC implementation for controling secure access to web documents and network resources with attribute certificates, and XACML architecture components. We show how to exhance the data security with GeoEncryption, Secure Enhanced Geolocking, and R2D2 concepts which deliver data to right places via right path. We show how Google Map and Web Crytpo API can be integrated for encrypted document on web browser without download apps and associate them with geolocking area to restrict unauthorize and improper accesses.الوحدات
L1.1 Proximity Based Encryption
1
Assignment
- L1.1 Practice Quiz
1
Videos
- Lesson 1.1 Location Based Encryption
2
Readings
- Read the seminal location based encryption paper by Scott Logan and Dorothy E. Denning.
- Get help and meet other learners in this course. Join your discussion forums!
L1.2 Secure Geo Coding
1
Assignment
- L1.2. Practice Quiz
1
Videos
- Lesson 4.2 Secure Enhanced Geolocking
1
Readings
- Read SEG master project report by Ashish Korpe
L1.3 Ensure the Data Delivery to Right Location
1
Assignment
- L1.3. Practice Quiz
1
Discussions
- Enhance Data Security by Integrating GeoEncryption and Secure Enhanced Geolocking.
1
Videos
- Ensure Data Delivery to Right Location
Project 4a. Design and Analysis of Secure Data Delivery Based on Geo Information.
1
Peer Review
- Design and Analysis of Secure Data Delivery Based on Geo Information
M1 Quiz
1
Assignment
- Quiz: M1 quiz
L2.1 Location Verification Using WiFi System
1
Assignment
- L2.1 Practice Quiz
1
Videos
- Verify User Location Using WiFi System
1
Readings
- Read the following papers related to Right Place Verification
L2.2 Location Verification Using Bluetooth Low Energy Devices
1
Assignment
- L2.2. Practice Quiz
1
Videos
- Location Verification Using Bluetooth Low Energy Devices
1
Readings
- Read paper on using RSSI measurement of BLE devices for localization
L2.3 Right Path Right Place Data Delivery (R2D2)
1
Assignment
- L2.3 Practice Quiz
1
Videos
- Right Path Right Place Data Delivery
1
Readings
- Read R2D2 paper on BLE location verification and SDN Data Path Confidence Analysis
M2 Quiz
1
Assignment
- M2 quiz
L3.1 Authentiation Credentials
1
Assignment
- L3.1 Practice Quiz
1
Videos
- Authentication Credentials
1
Readings
- Watch OAuth presentation.
L3.2 Digital Certificate Creation
1
Assignment
- L3.2 Practice Quiz
1
Videos
- Digital Certificate Creation
1
Readings
- Read how digital certificates are created for secure web access
L3.3 Role Based Access Control (RBAC)
1
Assignment
- L3.3 Practice Quiz
1
Videos
- Role Based Access Control (RBAC)
1
Readings
- Reading assignments for RBAC.
L3.4 RBAC Examples: Docker UCP and AWS IAM
1
Videos
- RBAC Examples: Docker UCP and AWS IAM
1
Readings
- Read Docker and AWS RBAC support example.
M3 Quiz
1
Assignment
- M3 Quiz
L4.1 Privilege Management Infrastructure and Attribute Certificates
1
Assignment
- L4.1 Practice Quiz
1
Videos
- Privilege Management Infrastructure and Attribute Certificates
1
Readings
- Read the following paper which utilize attribute certificates for secure information sharing.
L4.2 eXtensible Access Control Markup Language (XACML)
1
Assignment
- L4.2 Practice Quiz
1
Videos
- eXtensible Access Control Markup Language (XACML)
1
Readings
- Read key sections of OASIS Standard XACML version 3.0
L4.3 Attribute Based Access Control (ABAC)
1
Assignment
- Quiz L4.3 Practice Quiz
1
Videos
- Attribute Based Access Control
1
Readings
- Read Osama Khaleel's master thesis on Implementing an ABAC system with XACML 2.0
L4.4 Enforce: An ABAC Prototype for Controlling Web and Network Resources
1
Videos
- Enforce Testbed as an ABAC Example
M4 Quiz
1
Assignment
- M4 Quiz
Auto Summary
Explore advanced system security topics in this foundational IT & Computer Science course led by Coursera. Dive into RBAC, ABAC, and XACML 3.0 for managing access policies, and learn about secure access implementations in Docker and AWS IAM. Enhance your data security with GeoEncryption, Secure Enhanced Geolocking, and R2D2 concepts. Integrate Google Maps and Web Crypto API for secure, location-restricted document access. This course spans 900 minutes and offers Starter, Professional, and Paid subscription options, catering to professionals seeking to elevate their security expertise.

Edward Chow

Greg Williams