Students
- understand of basics and architecture of general cloud computing (K2)
- can analyze the security of different cloud architectures (K4)
- can interpret and assess the potential and risks of various security mechanisms and cryptography when applied in a cloud (K5)
- can make informed design decision for different cloud deployment models (SaaS, PaaS, …) (K5)
- can recommend cloud architectures and deployment principles with respect to security (K5)
- can discuss basic legal issues of cloud computing (K2)
- can design and assess key management architectures in clouds (K4)
- understand the interplay between hard- and software for trustworthy computing (K4)
|
- General Security Issues in Clouds
- Establishing Trust (TPMs, TEE, ...)
- Key Management in Clouds
- Trustworthy Storage
- Computations in Privacy: Cryptography and limits of computability in privacy
|