Accountability in Theory and Practice K√ľnnemann, Nemati

News

18.04.2019

Hi! Kick-off meeting is in Room 0.01, CISPA.

(s.t.)

15.04.2019

Kickoff meeting on Thursday!

Hi!

Thank you for chosing this seminar!

The kick-off meeting is scheduled for 18.04.2019 12:20 - 13:00. We will discuss the procedure, how grading is done and lose a few words about the papers. The location will be announced soon, but it will most likely be at... Read more

Hi!

Thank you for chosing this seminar!

The kick-off meeting is scheduled for 18.04.2019 12:20 - 13:00. We will discuss the procedure, how grading is done and lose a few words about the papers. The location will be announced soon, but it will most likely be at CISPA.

In case this appointment clashes with your schedule -- it is short notice, I admit -- please let us know as soon as possible. We will make slides available, though.

Last but not least: Hamed Nemati, Ph.D., will be instructing the seminar along side me. He is an expert on formal verification and looking forward to meet with you.

With kind regards, Robert

 

Accountability in Theory and Practice

Accountability is the ability of actors within a system to hold others accountable, e.g., for violating some policy or for acting in bad faith. Accountability is used to describe desiderata in social sciences, be it the accountability of a government or the accountability of actors in a company context, but we look at it from through the lense of security.

Aim of the seminar: understand accountability in different contexts and learn to use it as a guiding principle in system design; overview about concrete proposals for accountable security mechanisms. Last but not least: argue a point in reviews and rebuttals.

Modus operandi: Students bid for "authorship" of two papers and review another three ( at least one theoretical and one practical). The "authors" respond to the rebuttals (in groups). At the end, each student presents "their" paper.

Requirements: Basics on security: either you've attended a course like Security or Cryptography course, or you can argue that you are knowledgeable in information security. In the latter case, please use the motivation field to make this argument, e.g.: "I have not attended any security-focused course, but I earn my living hunting vulnerabilities for money."

Procedure:

tbd.



Privacy Policy | Legal Notice
If you encounter technical problems, please contact the administrators