data and applications security developments and directions
Download
Skip this Video
Download Presentation
Data and Applications Security Developments and Directions

Loading in 2 Seconds...

play fullscreen
1 / 8

Data and Applications Security Developments and Directions - PowerPoint PPT Presentation


  • 137 Views
  • Uploaded on

Data and Applications Security Developments and Directions. Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #1 Introduction to Data and Applications Security January 7, 2008. Outline. Data and Applications Security Developments and Directions Secure Semantic Web

loader
I am the owner, or an agent authorized to act on behalf of the owner, of the copyrighted work described.
capcha
Download Presentation

PowerPoint Slideshow about ' Data and Applications Security Developments and Directions' - cato


An Image/Link below is provided (as is) to download presentation

Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author.While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server.


- - - - - - - - - - - - - - - - - - - - - - - - - - E N D - - - - - - - - - - - - - - - - - - - - - - - - - -
Presentation Transcript
data and applications security developments and directions

Data and Applications Security Developments and Directions

Dr. Bhavani Thuraisingham

The University of Texas at Dallas

Lecture #1

Introduction to Data and Applications Security

January 7, 2008

outline
Outline
  • Data and Applications Security
    • Developments and Directions
  • Secure Semantic Web
    • XML Security; Other directions
  • Some Emerging Secure DAS Technologies
    • Secure Sensor Information Management; Secure Dependable Information Management
  • Some Directions for Privacy Research
    • Data Mining for handling security problems; Privacy vs. National Security; Privacy Constraint Processing; Foundations of the Privacy Problem
  • What are the Challenges?
developments in data and applications security 1975 present
Developments in Data and Applications Security: 1975 - Present
  • Access Control for Systems R and Ingres (mid 1970s)
  • Multilevel secure database systems (1980 – present)
    • Relational database systems: research prototypes and products; Distributed database systems: research prototypes and some operational systems; Object data systems; Inference problem and deductive database system; Transactions
  • Recent developments in Secure Data Management (1996 – Present)
    • Secure data warehousing, Role-based access control (RBAC); E-commerce; XML security and Secure Semantic Web; Data mining for intrusion detection and national security; Privacy; Dependable data management; Secure knowledge management and collaboration
developments in data and applications security multilevel secure databases i
Developments in Data and Applications Security: Multilevel Secure Databases - I
  • Air Force Summer Study in 1982
  • Early systems based on Integrity Lock approach
  • Systems in the mid to late 1980s, early 90s
    • E.g., Seaview by SRI, Lock Data Views by Honeywell, ASD and ASD Views by TRW
    • Prototypes and commercial products
    • Trusted Database Interpretation and Evaluation of Commercial Products
  • Secure Distributed Databases (late 80s to mid 90s)
    • Architectures; Algorithms and Prototype for distributed query processing; Simulation of distributed transaction management and concurrency control algorithms; Secure federated data management
developments in data and applications security multilevel secure databases ii
Developments in Data and Applications Security: Multilevel Secure Databases - II
  • Inference Problem (mid 80s to mid 90s)
    • Unsolvability of the inference problem; Security constraint processing during query, update and database design operations; Semantic models and conceptual structures
  • Secure Object Databases and Systems (late 80s to mid 90s)
    • Secure object models; Distributed object systems security; Object modeling for designing secure applications; Secure multimedia data management
  • Secure Transactions (1990s)
    • Single Level/ Multilevel Transactions; Secure recovery and commit protocols
some directions and challenges for data and applications security i
Some Directions and Challenges for Data and Applications Security - I
  • Secure semantic web
    • Security models
  • Secure Information Integration
    • How do you securely integrate numerous and heterogeneous data sources on the web and otherwise
  • Secure Sensor Information Management
    • Fusing and managing data/information from distributed and autonomous sensors
  • Secure Dependable Information Management
    • Integrating Security, Real-time Processing and Fault Tolerance
  • Data Sharing vs. Privacy
    • Federated database architectures?
some directions and challenges for data and applications security ii
Some Directions and Challenges for Data and Applications Security - II
  • Data mining and knowledge discovery for intrusion detection
    • Need realistic models; real-time data mining
  • Secure knowledge management
    • Protect the assets and intellectual rights of an organization
  • Information assurance, Infrastructure protection, Access Control
    • Insider cyber-threat analysis, Protecting national databases, Role-based access control for emerging applications
  • Security for emerging applications
    • Geospatial, Biomedical, E-Commerce, etc.
  • Other Directions
    • Trust and Economics, Trust Management/Negotiation, Secure Peer-to-peer computing,
coalition data and policy sharing
Coalition Data and Policy Sharing

Data/Policy for Federation

Export

Export

Data/Policy

Data/Policy

Export

Data/Policy

Component

Component

Data/Policy for

Data/Policy for

Agency A

Agency C

Component

Data/Policy for

Agency B

ad