Type A
|
Code |
Competences Specific | | A1 |
Project, calculate and design products, processes and installations in all areas of computer engineering. |
| A3 |
Perform mathematical modelling, calculation and simulation in company technology and engineering centres, particularly in tasks of research, development and innovation in all areas related to computer engineering. |
| D1 |
Integrate the fundamental technology, applications, services and systems of computer engineering, in general, and in a broader, multidisciplinary context. |
| T4 |
Design, develop, manage and evaluate mechanisms to certify and guarantee security in handling information and access to it in a local or distributed processing system. |
| T5 |
Analyse the information needs considered in an environment and execute all stages of the construction process of an information system. |
Type B
|
Code |
Competences Transversal | | B2 |
Aplicar el pensament crític, lògic i creatiu, demostrant capacitat d’innovació. |
| B3 |
Treballar de forma autònoma amb responsabilitat i iniciativa. |
Type C
|
Code |
Competences Nuclear | | C2 |
Be advanced users of the information and communication technologies |
| C3 |
Be able to manage information and knowledge |
| C5 |
Be committed to ethics and social responsibility as citizens and professionals |
Type A
|
Code |
Learning outcomes |
| A1 |
Integrate theoretical knowledge into the realities to which it may apply.
| | A3 |
Apply the techniques learned in a specific context.
| | D1 |
Analyse the problems and their causes from a global focus in the medium and long term.
| | T4 |
Design technology to guarantee privacy for scenarios of IT and telematics applications.
| | T5 |
Identify the components of a decision-making problem and know how to decide the most suitable decision-making model.
|
Type B
|
Code |
Learning outcomes |
| B2 |
Identify things that need to be improved in complex situations and contexts.
Apply innovative techniques and obtain results.
| | B3 |
Take correct decisions at key moments confidently, consistently and systematically.
|
Type C
|
Code |
Learning outcomes |
| C2 |
Understand the operating system as a hardware manager and the software as a working tool.
| | C3 |
Locate and access information effectively and efficiently.
| | C5 |
Respect fundamental rights and equality between men and women.
|
Topic |
Sub-topic |
1. Introduction |
a. Basic concepts of privacy
b. Legal principles
c. Privacy by design
d. Design strategies for privacy
|
2. Data privacy techniques |
a. Authentication
b. Attribute-based Credentials.
c. Secure and private communications
d. Anonymity and pseudo-anonymity in communications.
e. Privacy in data storages
f. Privacy-preserving computations.
g. Techniques for improving transparency.
|
3. Privacy in data bases |
a. Owner's privacy del propietari (Privacy-preserving data mining).
b. User's privacy (private information retrieval).
c. Respondent's privacy (anonymization).
|
4. User's privacy |
a. Issues of private information retrieval (PIR).
b. Modifications to PIR based on single users.
c. Modifications to PIR based on p2p networks (P2P PIR).
d. Rational behaviour in P2P PIR.
|
5. Anonymization in data bases |
a. Basic concepts
b. Privacy models
c. Protection of tables
d. Protection of interactive data bases.
e. Protection of microdata
g. Evaluation of statistical disclosure control methods.
h. Anonymizing software
|
Methodologies :: Tests |
|
Competences |
(*) Class hours
|
Hours outside the classroom
|
(**) Total hours |
Introductory activities |
|
2 |
0.5 |
2.5 |
Lecture |
|
24 |
36 |
60 |
Practicals using information and communication technologies (ICTs) in computer rooms |
|
14 |
21 |
35 |
Personal tuition |
|
1 |
0 |
1 |
|
Extended-answer tests |
|
2 |
5 |
7 |
Objective short-answer tests |
|
2 |
5 |
7 |
|
(*) On e-learning, hours of virtual attendance of the teacher. (**) The information in the planning table is for guidance only and does not take into account the heterogeneity of the students. |
Methodologies
|
Description |
Introductory activities |
The first session introduces the course, describing the objectives, schedule, and how the course will be assessed. |
Lecture |
The teacher explains the units of the course. |
Practicals using information and communication technologies (ICTs) in computer rooms |
There are four class works. All class works have several objectives to accomplish, by means of a set of exercises that students must complete.
The results obtained are discussed by the students at the end of each class. |
Personal tuition |
Practicals using information and communication technologies (ICTs) in computer rooms:
The students can ask questions related with the subject to the teacher. They can do their questions in class, to his office in office hours, through email, or Moodle.
Lecture:
The students can ask questions related with the subject to the teacher. They can do their questions in class, to his office in office hours, through email, or Moodle. |
Description |
Practicals using information and communication technologies (ICTs) in computer rooms:
The students can ask questions related with the subject to the teacher. They can do their questions in class, to his office in office hours, through email, or Moodle.
Lecture:
The students can ask questions related with the subject to the teacher. They can do their questions in class, to his office in office hours, through email, or Moodle.
The students can be attended out of office hours if they previously agree a meeting with the teacher. |
Methodologies |
Competences
|
Description |
Weight |
|
|
|
|
Practicals using information and communication technologies (ICTs) in computer rooms |
|
There are four class works. All class works have several objectives to accomplish by means of a set of exercises that students must complete.
The results obtained are discussed by the students at the end of each class.
The class work can be performed individually or in a group of two students. |
25 |
Objective short-answer tests |
|
The students have to conduct a written test of the unit 5.
Passing this test is required to pass the course. |
37.5 |
Extended-answer tests |
|
The students have to conduct a written test of the units 1, 2, 3 and 4.
Passing this test is required to pass the course. |
37.5 |
Others |
|
|
|
|
Other comments and second exam session |
Students who do not pass the subject in the continuous assessment have to carry out a examination on the second call, and deliver all class works. The exam will consist of two parts, corresponding to the two parts of the course (first part: units 1, 2, 3 and 4 - second part: unit 5). Each part is scored out of 10 points. The students have to obtain at least 4 in each of the parts to pass the examination, and the sum of the two parts must be greater than 10 points. The class-work must have a minimum of five to pass the course. Otherwise, the students can no pass the course. Students may not bring any electronic devices on the written tests. |
Basic |
|
o G. D’Acquisto, J. Domingo-Ferrer, P. Kikiras, V.
Torra, Y.-A. De Montjoye i A. Bourka (2015) Privacy by Design in Big Data –
An overview of privacy enhancing technologies in the era of big data analytics,
European Union Agency for Network and Information Security-ENISA. o G. Danezis, J. Domingo-Ferrer, M. Hansen, J.-H.
Hoepman, D. Le Métayer, R. Tirtea i S. Schiffner (2015) Privacy and Data
Protection by Design: From Policy to Engineering, European Union Agency for
Network and Information Security-ENISA. o J. Domingo-Ferrer, D. Sánchez i J. Soria-Comas
(2016) Database Anonymization: Privacy Models, Data Utility and Microaggregation-Based
Inter-Model Connections, Morgan & Claypool. o A. Hundepool, J. Domingo-Ferrer, L. Franconi, S.
Giessing, E. Schulte-Nordholt, K. Spicer i P.-P. de Wolf (2012) Statistical
Disclosure Control, Wiley. |
Complementary |
|
|
Subjects that continue the syllabus |
MULTIMEDIA SECURITY/17665211 |
|
Subjects that it is recommended to have taken before |
CRYPTOLOGY AND INFORMATION SECURITY/17665108 |
|
|
Other comments |
We recommend to have passed the subjects of "Cryptology and Information Security", and "Multimedia Security". |
(*)The teaching guide is the document in which the URV publishes the information about all its courses. It is a public document and cannot be modified. Only in exceptional cases can it be revised by the competent agent or duly revised so that it is in line with current legislation. |
|