Abstract
This paper describes a course in computer security for advanced undergraduate students in computer science and software engineering. The aim of the course is to give the student a thorough grounding in the principles and practice of cryptography and secure network protocols, and in the application of these to the development of e-commerce applications. An important part of the learning process is an assignment in which the student develops soft ware for a specified e-commerce application. The paper describes a number of these assignments that have been run over the past several years, and reflects on the lessons learned.
Please use the following format when citing this chapter: Steketee, C., Lock. P., 2007. in IFIP International Federation for Information Processing, Volume 237. Fifth World Conference on Information Security Education, eds. Futcher, L., Dodge, R., (Boston: Springer), pp. 113–120.
Chapter PDF
Similar content being viewed by others
Keywords
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.
References
J. Slay and P. Lock, “Developing an Undergraduate IT Security Stream: Industry Certification and the Development of Graduate Qualities,” presented at Fourth World Conference on Information Security Education, WISE4, Moscow, Russia, 2005.
Sun Microsystems, “Java Cryptography Extension (JCE) Reference Guide,” 2004, http://java.sun.com/j2se/1.5.0/docs/guide/security/jce/JCERefGuide.html, accessed 08/08/2006.
B. S. Bloom, Taxonomy of educational objectives. Boston, MA: Allyn and Bacon, 1984.
S. A. Shaikh, “Information Security Education in the UK: a proposed course in Secure E-Commerce Systems,” presented at 1st Annual Conference on Information Security Curriculum Development, Kennesaw, GA, USA, 2004.
Rochester Institute of Technology, “Secure E-Commerce,” 2006, http://register.rit.edu/courseSchedule/4002877, accessed 31/10/2006.
University of Aberdeen, “Security and Privacy,” 2006, http://www.csd.abdn.ac.uk/~jmasthof/teaching/CS5401/, accessed 31/10/2006.
R. Holloway, “Master in Information Security,” 2006, http://www.isg.rhul.ac.uk/msc, accessed 31/10/2006.
P. T. Rawles and K. A. Baker, “Developing a public key infrastructure for use in a teaching laboratory,” presented at 4th Conference on Information Technology Curriculum, Lafayette, Indiana, USA, 2003.
D. Boneh, “Cryptography and Computer Security: Programming Project #2,” 2004, http://crypto.stanford.edu/~dabo/courses/cs255_winter04/, accessed 14/08/2006.
W. G. Mitchener and A. Vahdat, “A Chat Room Assignment for Teaching Network Security,” presented at 32nd Technical Symposium on Computer Science Education (SIGCSE), 2001.
OpenSSL, http://www.openssl.org/, accessed 14/08/2006.
B. C. Neumann and T. Ts’o, “Kerberos: An Authentication Service for Computer Networks,” IEEE Communications, vol. 32, pp. 33–38, 1994.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2007 International Federation for Information Processing
About this paper
Cite this paper
Steketee, C., Lock, P. (2007). Software Assignments for a Course in Secure E-Commerce. In: Futcher, L., Dodge, R. (eds) Fifth World Conference on Information Security Education. WISE 2007. IFIP Advances in Information and Communication Technology, vol 237. Springer, New York, NY. https://doi.org/10.1007/978-0-387-73269-5_15
Download citation
DOI: https://doi.org/10.1007/978-0-387-73269-5_15
Published:
Publisher Name: Springer, New York, NY
Print ISBN: 978-0-387-73268-8
Online ISBN: 978-0-387-73269-5
eBook Packages: Computer ScienceComputer Science (R0)