标签归档:KTH

世界著名大学-瑞典皇家工学院

瑞典皇家理工学院,或称皇家工学院(瑞典文:Kungliga Tekniska högskolan,KTH)位于瑞典首都斯德哥尔摩,成立于1827年,为瑞典最大的工学院之一,校名原为“工学院”(Teknologiska Institutet),1877年起改为现名。瑞典全国约三分之一的工程师都出自这所大学。该校除了位于斯德哥尔摩东城的主校区外,另外还有西斯塔、汉宁南、胡丁厄和南泰利耶几个校区,是瑞典最大、最古老的公立理工类高等学校,也是一所国际性的高等教育机构,与世界上多所大学和学院建立了研究和教育关系。

瑞典皇家理工学院校徽

瑞典皇家理工学院校徽

名称: 瑞典皇家理工学院 Royal Institute of Technology (KTH)

校训: Vetenskap och Konst(“科学与艺术”)

创校: 1827年

类型: 公立大学

校长: Peter Gudmundson教授

所在: 瑞典斯德哥尔摩

校园: 市区及郊区

教员: 3,500人

机构成员:CLUSTER、CESAER、EUA及其他

目前,该大学在校本科及硕士生12,000名,在校博士以上研究生1600名,教职员工3500人,总占地面积为260,000平方米。瑞典皇家理工学院拥有设施一流的物理研究中心,并不断完善其提供的各类课程以适应当前社会的新需要致力于自然科学各个学科(如:建筑、产业经济、城市规划、环境技术、电子等)的教学和科研,也设继续教育,尤其在信息与通信技术和生物技术领域有自己的专长。

 

★瑞典最大的理工大学

★承担着瑞典三分之一以上的工程技术研究

★在微电子领域,SoC和一些工艺水平方面处于世界先进水平

★西斯塔校区所在的Kista科技园是仅次于美国硅谷的全球第二大信息技术中心

学校声誉

除了在广泛的专业领域内为学生提供一流的教育和研究设施以外,学校还与世界上许多国家的大学有着合作研究的项目和课题。瑞典皇家理工学院不断完善其提供的各类课程以适应当前社会的新需要,特别是针对新兴的信息工程和生物学,学校新创建了信息工程大学和拥有一流设施的物理研究中心。理论教学与实践的紧密结合,学校与企业的互惠合作使得其毕业学生深受用人单位的欢迎。

学校资源

现代化的实验室和优越的电脑设施为研究提供了极大的便利。在欧盟的研究课程中KTH起着主导作用。

学科设置

瑞典皇家工学院目前提供很多英语授课的硕士课程,包括:生物物理,管理信息系统,机械工程,环境工程,信息和通信系统安全,材料处理,量子物理,交互系统工程,房地产管理,软件工程,系统芯片设计,能源工程,计算科学等等。

世界排名

皇家理工大学在《泰晤士报高等教育增刊》2010年世界大学综合排名中位列第173位,工程及信息技术学科世界排名列第53位。

诺贝尔等奖项获得者

Hannes Alfvén, 诺贝尔物理学奖获得者, 等离子体物理学家,Lennart Carleson, 阿贝尔奖获得者(国际数学最高奖)

分享下我印象中的KTH:

10年夏天来报道的时候,被这金色的校徽和红绿色的爬山虎所吸引

KTH主校区的秋景

KTH主校区的秋景

ICT学院在KISTA校区,是和斯德哥尔摩大学合办的,坐落在所谓的欧洲硅谷,是个很新很先进的校区,我们专业也在这里

Kista FORUM Buiding

Kista FORUM Buiding

Kista校区比较洋气的一个教室,设备齐全先进

Kista的SAL B教室

Kista的SAL B教室

来之后不久就举办了一场交响乐表演,主校区的草坪舒服啊,坐满了人

symphony night in main campus

symphony night in main campus

圣诞节的时候再来主校,已经看不到几个人了,但却有着节日的气息

圣诞节的KTH

圣诞节的KTH

我最爱的一张作品,主校区外的一排自行车

KTH外淹没的Bicycles

KTH外淹没的Bicycles

2011夏天的主校

KTH主校区

KTH主校区

KTH主校区的草坪还是最让然留念的

KTH主校区

KTH主校区

KTH主校区的图书馆,最喜欢的是这书架和图书馆的那棵树

KTH主校区图书馆

KTH主校区图书馆

Diary for Principles of Computer Security

Darren’s Diary

Student Name: Huan Meng

Blog: http://mhuan.name/

E-mail: darren@mhuan.name

I hereby declare that the contents of my diary are my own words, unless otherwise clearly marked.

23 Sep 2010

               We talked about Access Control Policies, I’ll give my ideas and some questions about these polices.In Discretionary Access Control (DAC), although a system administrator controls the access, a user has the right to allow or refuse an access which he sets to an object. This control is based on the identities of both subject and object. That is why it is also called an identity-based access control (IBAC). A DAC based system has an Access Control List (ACL) on each resource object, which reflects the user has the allowed access to who he maps with. DAC is used in most desktop operating systems because of its flexibility, but there it also expands the risk and threats.

               Unlike DAC, Mandatory Access Control (MAC) is strict that the access is controlled by the system and can not be changed or altered by users. All the information between subjects and objects will be checked by the system which gives the permission for them. Compared with DAC, MAC is based on security label which contains a classification and a category to resource objects. When a user wants to access an object, these two pieces are always checked whether they are the same with the user’s certificate. So in the Bishop’s book, it is said that it is occasionally called a rule-based access control, but in which occasion can it be called this? In Rule Based Access Control (RBAC), access is also allowed or denied by the system, neither the subject nor the owner of the object. I think it’s the similarity of both policies; the difference is about the rules and the rules always exist in these policies. So can we say the security label has some rules for MAC? Furthermore what about the rules in ACL? If we can, what’s the difference between MAC and RBAC?

               In Originator Controlled Access Control (ORCON), the creator of an object has the right to control the object and the access to the object. So a subject can give another subject rights to an object only with the approval of the creator of that object. ORCON makes the originators of documents retain control over them even after those documents are disseminated. This is more advantageous than MAC/DAC in handling such environments.

               Role Based Access Control (RBAC), also known as Non discretionary Access Control, takes more of a real world approach to structuring access control. Access under RBAC is based on a user’s job function within the organization to which the computer system belongs. So it is an actual policy for each role in different circumstance.Although there may be few rights for the user acted as a role in a system, it is a good way to control the permissions appropriately and it is also effective to protect the whole system.

21 Sep 2010

               After the lecture, I studied the Bishop’s book about access control mechanisms-ACLS and Capabilities combined with the review of Access Control Matrix in Chapter 2.

               In my opinion, although ACM is the abstraction mechanism, its clearest and purest form can make us understand any expressible security policy. Considering that many systems have too many objects and subjects who need much space, the ACM give simple way to analyze the security problems.

              Access control mechanisms explain how to control the subjects and objects. In ACL which binds the data controlling access to the object,

I learned that:

It can limit network traffic and improve network performance. For example, ACL can specify the priority of the data packets according to the protocol of packets.

It provides means of communication traffic control. For example, ACL can restrict or simplify the length of the routing update information, thereby limit the communication flows in some network segments of a router.

ACL provides the basic means to secure the access to the network. E.g. ACL allows host A to access to the network of human resources, and refuses host B to access.

At the port of the router, ACL can decide which type of traffic is forwarded or blocked.

18 Sep 2010

               In lecture seven, we talk about some methods of password cracking and how to choose a good password as well as how to make it valid secretly. So I will explain about these topics with my conclusion and opinion.

Password cracking:

1、Exhaustive attack: A trial-and-error attempt to violate computer security by systematically attempting to use a very large number of possible passwords or keys.

2、Dictionary attack: A dictionary file (a text file full of dictionary words) is loaded into the crack applications (such as LophtCrack), which runs based on the user account targeted by the application. Because most passwords are usually simple, running a dictionary attack is often sufficient to achieve the purpose.

3、Hybrid attack: Hybrid attack will add numbers and symbols to the file name to crack the code successfully. Many people change the password just by adding a number after the current password. The model commonly used in this form: The password is “cat” first month; the password of next month is “cat1”; the next password is “cat2”, and so on.

4、Social engineering scam: It utilize small public trick to lead the victim into a trap. This technique usually achieves by talking, cheating, using forgery or spoken words to legitimate users in order to get user list, user passwords and network structure.

5、Sniffer: Network “sniffer” allows an attacker to view the network traffic in real time. From these movements, they can pick out interesting data, including password which is lack of protection. Using IPSec and Kerberos security protocols can protect valuable data from being decrypted so that the sniffer can only record useless information.

6、 Trojan horse: A Trojan horse software that looks harmless will induce users to allow them to run. Once these programs run, they can use the user’s context through a variety of ways to attack the network. It can be done including monitoring the user’s keyboard input and sending them to third parties. For example, when users access to non-domain resources required to enter a password to be authenticated, the Trojan can intercept the user’s password.

15 Sep 2010

               In today’s lecture, Alan gives us a question about the difference between authentication and identification. From the Bishop’s book, authentication is defined as the binding of an identity to a subject. As far as I’m concerned, it is like someone should prove who he is. So he must provide information to confirm his identity, maybe his face, voice, DNA, a key or a password. The information can be looked as his specific identities relatively, but they can also be counterfeited. Therefore, the process of recognizing the information is called identification and we must be sure that these identities are accurate and believable. Only when these identities are checked and verified in a process of an identification, we can say the authentication is OK. So this is my understanding of their difference, but it’s also hard to tell the difference between authentication and identification, so what’s the real difference of them? How to compare or contrast?


Comment by IoannisKakavas :

You can map the difference between identification and authentication as following Identification is the process when you say that you are Darren ( For instance providing a username ) Authentication is the process when you actually prove that you are Darren ( Providing the correct password that is associated with this username)


12 Sep 2010

               In One-Time Pad, the key string is chosen at random and we use the random key only once. It is difficult to break using large scale computer theoretically, but in practical, it is impossible to break. One-Time Pad idea has already been used as the safest key in some banks and game account. For example in BOC, we use E-token as our key for e-bank, the 6 digits key changes every minute irregularly, and the key can be used only once before it changes. However, it’s also a relatively safe way on the internet. Attackers can use “Phishing” website, Trojan horses to get users’ account information. These users also suffer from Stealing DC, bugs of ID authentication and so on.

               In the public key system e.g. RSA, we can use a pair of public key and private key to provide a type of nonrepudiation of origin, which is a kind of authentication to ensure that the message is from certain people e.g. digital signature. In the encryption of RSA, even though we can make the n large enough, there are some risks that the message can be changed or broken. The attacker often adopts “forward search” or “precomputation” to change the order of the blocks, which may lead to wrong information or get some simple message comparing the ciphertext he enciphers from a public key with that he intercepts from the originator.

8 Sep 2010

               We’ve talked about basic cryptography in this lecture. Alan presents Caesar cipher as an example to illustrate some aspects and elements in cryptography.

Enciphering functions: E = { Ek | k ∈ K and for all m ∈ M, Ek(m) = (m + k) mod 26 }

Deciphering functions: D = { Dk | k ∈ K and for all c ∈ C, Dk(c) = (26 + c k) mod 26 }

               Caesar cipher is so weak, because it is easy for others to find the key with only the ciphertext in a ciphertext only attack, with the ciphertext and the plaintext enciphered In a known plaintext attack or with specific plaintexts enciphered In a chosen plaintext attack. The keyspace is small,

               Cryptography has two common cryptographic algorithm for the symmetric cipher algorithm (single-key encryption algorithm) and non-symmetric encryption algorithm (public key encryption algorithm). DES and RSA represents each of the algorithms. But it is hard to say which is better. They have their own advantages in some aspects of algorithm, such as processing speed of algorithm, key allocation and so on.They are used in different kinds of field and the security of both of them is relatively high. There are lots of other algorithms in this area and which we should choose is based on our demands.

4 Sep 2010

               From yesterday to today, I read the book Introduction to Computer Security and put these three lectures and slides in order systematically in my mind.

               I read about CIA(Confidentiality,Integrity,Availability) again combined with the access control matrix model. Access control mechanisms support confidentiality by cryptography and other system-dependent mechanisms which can preserve confidentiality better than the former, when the controls work well based on an ideal good access control matrix model. I think this is the most important way to support confidentiality compared with cryptography or resource hiding. But the point is that the access control matrix model is an abstract model and there is no such a perfect particular implementation or system which never fails. From the the generality of the AC matrix, I’ve seen AC matrix example on a LAN and a program and how rights work as entries in this two AC matrix. The relationship between subjects and objects is hard to balance in AC matrix. The rights for both of them, such as “write”,”read”,”append” and “execute” between processes and files, depend on the instantiation of the model and you can never make sure these functions are always easy undertook.

There is also a question about Alan ‘s bank account balance: Balance(t)=B(y)+D(y)-W(y), how does it work and why?


Comment by Spyridon Dossis : Concerning your question about the bank account balance, i think you mention a characteristic example that is given to point out the importance of data integrity especially in commercial environments. The equation represents a normal operation that can happen in a bank system where the calculated Balance in the end of each day must be equal to the sum of previously deposited money plus the current’s day deposited one minus the withdrawn amount. Therefore e.g. when a program changes a value, the system must impose a rule that such a equation must always be valid, in order to ensure the consistency of the data. You can read more about this topic in the course book in the section of Clark-Wilson Integrity Model. A relevant topic from enterprise and database systems is the notion of transactions. There a complex operation consisting of a set of simpler one operations (like additions or subtractions as in the previous example) must either be performed successfully as a whole either in the case of even one failed intermediate step the whole process must be roll-backed and the initial state of the system recovered. See Transaction processing for more on this. The main aim of this is to preserve the integrity and consistency of system’s data.


2 Sep 2010

               I have found many information about this course on FirstClass and also understand how to get information, discuss with others, how to learn this course through this powerful tool. I’ve already cleared up my mind and made a study plan. I think this preparation is a good start for my study.

               I once compared some treats listed in the first lecture and found that DoS/DDoS do a great threat to those companies in China. A company based on IM which is called TX suffers from those attacks and threats. Because of the unripe network in china, the company invest much money and manpower on security for their data of custom and other secrets. There is no definition of security, the ideal model of security is to find threats prior, but it is impossible yet. Any defense is base on pre-existing knowledge or some caculation, there are little ways to discover potential threats actively. The criminals for security are always happening and the defense and fights against those attacks will never stop.

Reference

Bishop, Matt. Introduction to Computer Security, Addison Wesley, 2005.

瑞典信息化全球折桂的秘密

     

      以高福利闻名的北欧国家,国土面积虽小,信息化建设水平却远超美国等老牌强国。五个小国在全球信息化排名中占据前十名中的四席,瑞典更是高居全球榜首,这背后的秘密你没有理由不知道。

      在我们以往的认知中,北欧国家以高福利而闻名。但鲜有人关注的是,除了完善的社会保障体系,发达的信息技术给民众带来的生活变革其实也是构成福利的重要部分。在今年世纪经济论坛(WEF)发布的《2009-2010 全球信息科技报告》中,北欧四国(瑞典、丹麦、芬兰、挪威)全都进入前十名的行列,瑞典更是高居榜首。

     信息福利

      WEF已连续9年评比全球各国的网络就绪指数(Networked Readiness Index,NRI),评价范围涵盖全球133个经济体,测算国家整体环境、网络完善程度和信息技术使用普及度三项指标,作为衡量各国信息社会进展的重要参考,并被视为是衡量信息通信技术(ICT)产业竞争力的排名。

      在最新发布的《2009-2010 全球信息科技报告》中,瑞典在多项指标中名列第一,国家整体环境得到了5.85的最高分,单项基础设施建设也获得了最高分。

      其实瑞典早就是信息化强国,只是这一次表现得尤为抢眼。每年占全国GDP近4%的信息化投入,让欧盟倡导的“无所不在”信息社会理念在瑞典得到了充分体现。

      在瑞典皇家理工学院的教室里,教授在讲解课件时,学生可以通过蓝牙通信共享正在演示的课件。互动时,学生可以通过系统直接将疑问显示到教授的电脑桌面。

      即便是在普通出租车上,你都能深刻体会到信息互通的便利。根据导航仪上交通部门提供的实时道路交通流量分析,司机可以与你一起规划合适的行车路线。

      截至2009年,瑞典家庭网民普及率达到84%,移动通信普及率达到94%。3G应用普及率达到92%,看移动电视、用可视电话成为民众生活中的普遍现象。

      看似简单的信息互通,实际上对瑞典国内信息技术应用中传感、地理信息和无线网络通信等基础性技术与建设都提出了极高要求,也直接加速了服务商的竞争与发展。以电信领域为例,截至2009年,国土面积仅为45万平方千米的瑞典就有5个3G运营商、4个GSM运营商(其中3个双运营商)、600多个虚拟业务运营商,有力保障了基础通信的便捷。

      通过在经济、社会领域广泛应用信息和通信技术,瑞典基本实现了任何人在任何时间、任何地方实现人与人之间的信息共享,并尽可能地实现物体之间在任何时间、任何地方互联。

      瑞典政府始终认为,ICT快速发展和深入应用能促进国家政治、经济、文化等各领域的发展,能使国民的生产和生活有效突破对传统交通、通信手段的依赖,拓展发展空间和交往空间,因此,只有努力构建“无所不在”的信息社会,才能使国家在世界经济的发展中保持领先地位。

夺冠之路

      瑞典在信息化建设中取得如此骄人的成就,与政府积极推广是分不开的。瑞典政府很早就提出要建设数字瑞典,实现全民信息化社会,充分利用信息技术的优势来提高瑞典的国际竞争力并增加人民福利。

      早在1994年,瑞典政府就成立了“信息技术委员会”作为政府信息技术宏观决策的咨询机构。2000年瑞典政府出台《全民信息化社会》议案,明确提出信息技术发展的目标、优先发展领域以及相关的措施。2002年,瑞典颁布了更细致的政策,指导电信、交通、传媒等部门相互协调和融合。2005年,瑞典加大了宽带网络建设,同时,在政府公务中推广实施电子签名和网络办公方案。

      瑞典政府认为,放松对通信产业的限制有利于国家信息基础设施建设。2002年,瑞典出台《进一步促进移动通信市场竞争法案》,规定所有移动通信供应商都有权进入移动通信网络。结果如瑞典政府预料,在加大竞争,降低准入门槛后,信息技术应用领域不断扩大,消费需求旺盛,信息产业投资高速增长,通信服务价格下降了90%。

      在大力发展信息技术产业的同时,瑞典政府还不断推动以信息和通信技术为主的高新技术对传统工业进行改造,这与我国推行的“两化融合”有异曲同工之妙。

      通过法律手段对传统企业生产过程的材料选择、能源消耗、污染排放和废旧产品回收等方面做出严格规定,激励企业应用信息技术等高新技术实现精细生产,自上世纪90年代以来,瑞典传统工业的生产能力和效率不断提高,产量增长的同时,污染物排放显著减少。这也引发了迅猛而彻底的企业变革,ABB、伊莱克斯等制造业企业借助应用信息技术,既保持了自身的领先地位,又带动了信息技术产业的发展。瑞典的实践表明,优先发展信息技术产业和鼓励信息技术应用是工业化的明智选择。

      加强研发机构建设也是瑞典成功建设信息化的高招。瑞典把规模大、专业性强的研究机构发展成为学术界和产业界之间有效的连接点,促进科研开发面向产业和公共服务。对于市场环境下投资效益不明显、历时较长,难以获得资助的基础性、公共性信息技术研发,政府给予财政投入。近年来,瑞典全社会研发投入占GDP的4%,其中80%投向了信息技术等重点产业部门。