Software Assignments for a Course in Secure E-Commerce

  • Chris Steketee
  • Phillip Lock
Conference paper
Part of the IFIP Advances in Information and Communication Technology book series (IFIPAICT, volume 237)


This paper describes a course in computer security for advanced undergraduate students in computer science and software engineering. The aim of the course is to give the student a thorough grounding in the principles and practice of cryptography and secure network protocols, and in the application of these to the development of e-commerce applications. An important part of the learning process is an assignment in which the student develops soft ware for a specified e-commerce application. The paper describes a number of these assignments that have been run over the past several years, and reflects on the lessons learned.


Security Analysis Certificate Authority Chat Room Authentication Server Digital Right Management 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


  1. 1.
    J. Slay and P. Lock, “Developing an Undergraduate IT Security Stream: Industry Certification and the Development of Graduate Qualities,” presented at Fourth World Conference on Information Security Education, WISE4, Moscow, Russia, 2005.Google Scholar
  2. 2.
    Sun Microsystems, “Java Cryptography Extension (JCE) Reference Guide,” 2004,, accessed 08/08/2006.
  3. 3.
    B. S. Bloom, Taxonomy of educational objectives. Boston, MA: Allyn and Bacon, 1984.Google Scholar
  4. 4.
    S. A. Shaikh, “Information Security Education in the UK: a proposed course in Secure E-Commerce Systems,” presented at 1st Annual Conference on Information Security Curriculum Development, Kennesaw, GA, USA, 2004.Google Scholar
  5. 5.
    Rochester Institute of Technology, “Secure E-Commerce,” 2006,, accessed 31/10/2006.
  6. 6.
    University of Aberdeen, “Security and Privacy,” 2006,, accessed 31/10/2006.
  7. 7.
    R. Holloway, “Master in Information Security,” 2006,, accessed 31/10/2006.
  8. 8.
    P. T. Rawles and K. A. Baker, “Developing a public key infrastructure for use in a teaching laboratory,” presented at 4th Conference on Information Technology Curriculum, Lafayette, Indiana, USA, 2003.Google Scholar
  9. 9.
    D. Boneh, “Cryptography and Computer Security: Programming Project #2,” 2004,, accessed 14/08/2006.
  10. 10.
    W. G. Mitchener and A. Vahdat, “A Chat Room Assignment for Teaching Network Security,” presented at 32nd Technical Symposium on Computer Science Education (SIGCSE), 2001.Google Scholar
  11. 11.
    OpenSSL,, accessed 14/08/2006.
  12. 12.
    B. C. Neumann and T. Ts’o, “Kerberos: An Authentication Service for Computer Networks,” IEEE Communications, vol. 32, pp. 33–38, 1994.CrossRefGoogle Scholar

Copyright information

© International Federation for Information Processing 2007

Authors and Affiliations

  • Chris Steketee
    • 1
  • Phillip Lock
    • 1
  1. 1.Advanced Computing Research Centre School of Comp and Info ScienceUniversity of South AustraliaMawson LakesAustralia

Personalised recommendations