{"id":1243,"date":"2026-01-23T09:44:46","date_gmt":"2026-01-23T09:44:46","guid":{"rendered":"https:\/\/www-2025.informatica.uniroma2.it\/home\/ricerca-e-terza-missione\/gruppi-di-ricerca\/systems-data-security\/"},"modified":"2026-05-23T08:20:47","modified_gmt":"2026-05-23T08:20:47","slug":"systems-data-security","status":"publish","type":"page","link":"https:\/\/informatica.uniroma2.it\/en\/home\/ricerca-e-terza-missione\/gruppi-di-ricerca\/systems-data-security\/","title":{"rendered":"Systems &amp; Data Security"},"content":{"rendered":"\n<h2 class=\"wp-block-heading has-white-color has-text-color has-background has-link-color wp-elements-d190816126a9dc8e9413a95f7c99f7cc\" style=\"background-color:#007d3c;font-style:normal;font-weight:600;letter-spacing:3px;text-transform:uppercase\">systems &amp; data security<\/h2>\n\n<div class=\"wp-block-group\"><div class=\"wp-block-group__inner-container is-layout-constrained wp-block-group-is-layout-constrained\">\n<div style=\"height:25px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n<\/div><\/div>\n\n<h3 class=\"wp-block-heading has-black-color has-text-color has-link-color wp-elements-29f2d572f7134fa63822867690ae0f31\" style=\"font-style:normal;font-weight:600;text-transform:uppercase\">Topics<\/h3>\n\n<hr class=\"wp-block-separator has-text-color has-alpha-channel-opacity has-background is-style-default\" style=\"background-color:#007c3d;color:#007c3d\"\/>\n\n<h2 class=\"wp-block-heading section-title\">Blockchain<\/h2>\n\n<div class=\"wp-block-group has-base-2-background-color has-background\" style=\"padding-top:2rem;padding-right:2rem;padding-bottom:2rem;padding-left:2rem\"><div class=\"wp-block-group__inner-container is-layout-constrained wp-container-core-group-is-layout-2c0d047f wp-block-group-is-layout-constrained\">\n<ul class=\"wp-block-list\">\n<li>Bitcoin, Ethereum, Hyperledger Fabric, Indy.<\/li>\n\n\n\n<li>Permissioned vs permissionless, private vs public blockchains.<\/li>\n\n\n\n<li>Consensus mechanisms, smart contracts, non-fungible tokens (NFTs).<\/li>\n\n\n\n<li>Performance issues related to speed and data size.<\/li>\n<\/ul>\n<\/div><\/div>\n\n<hr class=\"wp-block-separator has-text-color has-black-color has-alpha-channel-opacity has-black-background-color has-background\"\/>\n\n<h2 class=\"wp-block-heading section-title\">Information Security<\/h2>\n\n<div class=\"wp-block-group has-base-2-background-color has-background\" style=\"padding-top:2rem;padding-right:2rem;padding-bottom:2rem;padding-left:2rem\"><div class=\"wp-block-group__inner-container is-layout-constrained wp-container-core-group-is-layout-2c0d047f wp-block-group-is-layout-constrained\">\n<p class=\"wp-block-paragraph\">IT security plans, cybersecurity, attacks and defenses.<\/p>\n<\/div><\/div>\n\n<hr class=\"wp-block-separator has-text-color has-black-color has-alpha-channel-opacity has-black-background-color has-background\"\/>\n\n<h2 class=\"wp-block-heading section-title\">Distributed Cooperative Systems<\/h2>\n\n<div class=\"wp-block-group has-base-2-background-color has-background\" style=\"padding-top:2rem;padding-right:2rem;padding-bottom:2rem;padding-left:2rem\"><div class=\"wp-block-group__inner-container is-layout-constrained wp-container-core-group-is-layout-2c0d047f wp-block-group-is-layout-constrained\">\n<ul class=\"wp-block-list\">\n<li>Elementary transaction issues.<\/li>\n\n\n\n<li>Conceptual and logical models for elementary and complex transactions.<\/li>\n\n\n\n<li>Cooperation agreements, Validation Authorities, transaction observation and tracking.<\/li>\n\n\n\n<li>Validation rules and access rules.<\/li>\n<\/ul>\n<\/div><\/div>\n\n<hr class=\"wp-block-separator has-text-color has-black-color has-alpha-channel-opacity has-black-background-color has-background\"\/>\n\n<h2 class=\"wp-block-heading section-title\">Cryptography<\/h2>\n\n<div class=\"wp-block-group has-base-2-background-color has-background\" style=\"padding-top:2rem;padding-right:2rem;padding-bottom:2rem;padding-left:2rem\"><div class=\"wp-block-group__inner-container is-layout-constrained wp-container-core-group-is-layout-2c0d047f wp-block-group-is-layout-constrained\">\n<ul class=\"wp-block-list\">\n<li>Random number generators.<\/li>\n\n\n\n<li>Symmetric and asymmetric cryptographic algorithms.<\/li>\n\n\n\n<li>Blum numbers and ciphering.<\/li>\n\n\n\n<li>Modular arithmetic, secure key exchange.<\/li>\n\n\n\n<li>SSL and HTTPS protocols.<\/li>\n<\/ul>\n<\/div><\/div>\n\n<hr class=\"wp-block-separator has-text-color has-black-color has-alpha-channel-opacity has-black-background-color has-background\"\/>\n\n<h2 class=\"wp-block-heading section-title\">Identity Management<\/h2>\n\n<div class=\"wp-block-group has-base-2-background-color has-background\" style=\"padding-top:2rem;padding-right:2rem;padding-bottom:2rem;padding-left:2rem\"><div class=\"wp-block-group__inner-container is-layout-constrained wp-container-core-group-is-layout-2c0d047f wp-block-group-is-layout-constrained\">\n<ul class=\"wp-block-list\">\n<li>The AAAA model and its evolutions.<\/li>\n\n\n\n<li>Authentication vs authorization.<\/li>\n\n\n\n<li>Multilevel and multi-organization access management.<\/li>\n\n\n\n<li>Identity token architectures and related issues.<\/li>\n\n\n\n<li>Identity chain management and construction.<\/li>\n<\/ul>\n<\/div><\/div>\n","protected":false},"excerpt":{"rendered":"<p>systems &amp; data security Topics Blockchain Information Security IT security plans, cybersecurity, attacks and defenses. Distributed Cooperative Systems Cryptography Identity Management<\/p>\n","protected":false},"author":3,"featured_media":0,"parent":1206,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-1243","page","type-page","status-publish","hentry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Systems &amp; Data Security - INFORMATICA<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/informatica.uniroma2.it\/en\/home\/ricerca-e-terza-missione\/gruppi-di-ricerca\/systems-data-security\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Systems &amp; Data Security - INFORMATICA\" \/>\n<meta property=\"og:description\" content=\"systems &amp; data security Topics Blockchain Information Security IT security plans, cybersecurity, attacks and defenses. Distributed Cooperative Systems Cryptography Identity Management\" \/>\n<meta property=\"og:url\" content=\"https:\/\/informatica.uniroma2.it\/en\/home\/ricerca-e-terza-missione\/gruppi-di-ricerca\/systems-data-security\/\" \/>\n<meta property=\"og:site_name\" content=\"INFORMATICA\" \/>\n<meta property=\"article:modified_time\" content=\"2026-05-23T08:20:47+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/informatica.uniroma2.it\\\/en\\\/home\\\/ricerca-e-terza-missione\\\/gruppi-di-ricerca\\\/systems-data-security\\\/\",\"url\":\"https:\\\/\\\/informatica.uniroma2.it\\\/en\\\/home\\\/ricerca-e-terza-missione\\\/gruppi-di-ricerca\\\/systems-data-security\\\/\",\"name\":\"Systems &amp; Data Security - INFORMATICA\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/informatica.uniroma2.it\\\/en\\\/#website\"},\"datePublished\":\"2026-01-23T09:44:46+00:00\",\"dateModified\":\"2026-05-23T08:20:47+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/informatica.uniroma2.it\\\/en\\\/home\\\/ricerca-e-terza-missione\\\/gruppi-di-ricerca\\\/systems-data-security\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/informatica.uniroma2.it\\\/en\\\/home\\\/ricerca-e-terza-missione\\\/gruppi-di-ricerca\\\/systems-data-security\\\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/informatica.uniroma2.it\\\/en\\\/home\\\/ricerca-e-terza-missione\\\/gruppi-di-ricerca\\\/systems-data-security\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/informatica.uniroma2.it\\\/en\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Research and Third Mission\",\"item\":\"https:\\\/\\\/informatica.uniroma2.it\\\/en\\\/home\\\/ricerca-e-terza-missione\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Research Group\",\"item\":\"https:\\\/\\\/informatica.uniroma2.it\\\/en\\\/home\\\/ricerca-e-terza-missione\\\/gruppi-di-ricerca\\\/\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"Systems &amp; Data Security\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/informatica.uniroma2.it\\\/en\\\/#website\",\"url\":\"https:\\\/\\\/informatica.uniroma2.it\\\/en\\\/\",\"name\":\"INFORMATICA\",\"description\":\"UNIVERSITA&#039; DEGLI STUDI ROMA &quot;TOR VERGATA&quot;\",\"publisher\":{\"@id\":\"https:\\\/\\\/informatica.uniroma2.it\\\/en\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/informatica.uniroma2.it\\\/en\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/informatica.uniroma2.it\\\/en\\\/#organization\",\"name\":\"CORSO DI LAUREA IN INFORMATICA\",\"url\":\"https:\\\/\\\/informatica.uniroma2.it\\\/en\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/informatica.uniroma2.it\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www-2025.informatica.uniroma2.it\\\/wp-content\\\/uploads\\\/2026\\\/02\\\/cropped-favicon.png\",\"contentUrl\":\"https:\\\/\\\/www-2025.informatica.uniroma2.it\\\/wp-content\\\/uploads\\\/2026\\\/02\\\/cropped-favicon.png\",\"width\":512,\"height\":512,\"caption\":\"CORSO DI LAUREA IN INFORMATICA\"},\"image\":{\"@id\":\"https:\\\/\\\/informatica.uniroma2.it\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Systems &amp; Data Security - INFORMATICA","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/informatica.uniroma2.it\/en\/home\/ricerca-e-terza-missione\/gruppi-di-ricerca\/systems-data-security\/","og_locale":"en_US","og_type":"article","og_title":"Systems &amp; Data Security - INFORMATICA","og_description":"systems &amp; data security Topics Blockchain Information Security IT security plans, cybersecurity, attacks and defenses. Distributed Cooperative Systems Cryptography Identity Management","og_url":"https:\/\/informatica.uniroma2.it\/en\/home\/ricerca-e-terza-missione\/gruppi-di-ricerca\/systems-data-security\/","og_site_name":"INFORMATICA","article_modified_time":"2026-05-23T08:20:47+00:00","twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/informatica.uniroma2.it\/en\/home\/ricerca-e-terza-missione\/gruppi-di-ricerca\/systems-data-security\/","url":"https:\/\/informatica.uniroma2.it\/en\/home\/ricerca-e-terza-missione\/gruppi-di-ricerca\/systems-data-security\/","name":"Systems &amp; Data Security - INFORMATICA","isPartOf":{"@id":"https:\/\/informatica.uniroma2.it\/en\/#website"},"datePublished":"2026-01-23T09:44:46+00:00","dateModified":"2026-05-23T08:20:47+00:00","breadcrumb":{"@id":"https:\/\/informatica.uniroma2.it\/en\/home\/ricerca-e-terza-missione\/gruppi-di-ricerca\/systems-data-security\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/informatica.uniroma2.it\/en\/home\/ricerca-e-terza-missione\/gruppi-di-ricerca\/systems-data-security\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/informatica.uniroma2.it\/en\/home\/ricerca-e-terza-missione\/gruppi-di-ricerca\/systems-data-security\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/informatica.uniroma2.it\/en\/"},{"@type":"ListItem","position":2,"name":"Research and Third Mission","item":"https:\/\/informatica.uniroma2.it\/en\/home\/ricerca-e-terza-missione\/"},{"@type":"ListItem","position":3,"name":"Research Group","item":"https:\/\/informatica.uniroma2.it\/en\/home\/ricerca-e-terza-missione\/gruppi-di-ricerca\/"},{"@type":"ListItem","position":4,"name":"Systems &amp; Data Security"}]},{"@type":"WebSite","@id":"https:\/\/informatica.uniroma2.it\/en\/#website","url":"https:\/\/informatica.uniroma2.it\/en\/","name":"INFORMATICA","description":"UNIVERSITA&#039; DEGLI STUDI ROMA &quot;TOR VERGATA&quot;","publisher":{"@id":"https:\/\/informatica.uniroma2.it\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/informatica.uniroma2.it\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/informatica.uniroma2.it\/en\/#organization","name":"CORSO DI LAUREA IN INFORMATICA","url":"https:\/\/informatica.uniroma2.it\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/informatica.uniroma2.it\/en\/#\/schema\/logo\/image\/","url":"https:\/\/www-2025.informatica.uniroma2.it\/wp-content\/uploads\/2026\/02\/cropped-favicon.png","contentUrl":"https:\/\/www-2025.informatica.uniroma2.it\/wp-content\/uploads\/2026\/02\/cropped-favicon.png","width":512,"height":512,"caption":"CORSO DI LAUREA IN INFORMATICA"},"image":{"@id":"https:\/\/informatica.uniroma2.it\/en\/#\/schema\/logo\/image\/"}}]}},"_links":{"self":[{"href":"https:\/\/informatica.uniroma2.it\/en\/wp-json\/wp\/v2\/pages\/1243","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/informatica.uniroma2.it\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/informatica.uniroma2.it\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/informatica.uniroma2.it\/en\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/informatica.uniroma2.it\/en\/wp-json\/wp\/v2\/comments?post=1243"}],"version-history":[{"count":3,"href":"https:\/\/informatica.uniroma2.it\/en\/wp-json\/wp\/v2\/pages\/1243\/revisions"}],"predecessor-version":[{"id":2269,"href":"https:\/\/informatica.uniroma2.it\/en\/wp-json\/wp\/v2\/pages\/1243\/revisions\/2269"}],"up":[{"embeddable":true,"href":"https:\/\/informatica.uniroma2.it\/en\/wp-json\/wp\/v2\/pages\/1206"}],"wp:attachment":[{"href":"https:\/\/informatica.uniroma2.it\/en\/wp-json\/wp\/v2\/media?parent=1243"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}