1 / 20

Data and Applications Security Developments and Directions

This course provides an overview of concepts, developments, challenges, and directions in data and applications security. Topics include database security, distributed data management security, object security, and more.

mmccollum
Download Presentation

Data and Applications Security Developments and Directions

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Data and Applications Security Developments and Directions Dr. Bhavani Thuraisingham The University of Texas at Dallas Introduction to the Course January 11, 2005

  2. Objective of the Unit • This unit provides an overview of the course. The course describes concepts, developments, challenges, and directions in data and applications security. Topics include • database security, distributed data management security, object security, data warehouse security, data mining for security applications, privacy, secure semantic web, secure digital libraries, secure knowledge management and secure sensor information management.

  3. Outline of the Unit • Outline of Course • Course Work • Course Rules • Contact • Appendix

  4. Outline of the Course • Unit #1: Introduction to Data and Applications • Part I: Background • Unit #2: Data Management • Unit #3: Information Security • Unit #4: Information Management • Part II: Discretionary Security • Unit #5: Concepts • Unit #6: Policy Enforcement • Part III: Mandatory Security • Unit #7: Concepts • Unit #8: Architectures

  5. Outline of the Course (Continued) • Part IV: Secure Relational Data Management • Unit #9: Data Model • Unit #10: Functions • Unit #11: Prototypes and Products • Part V: Inference Problem • Unit #12: Concepts • Unit #13: Constraint Processing • Unit #14: Conceptual Structures • Part VI: Secure Distributed Data Management • Unit #15: Secure Distributed Databases • Unit #16: Secure Heterogeneous Database Integration • Unit #17: Secure Federated Database Management

  6. Outline of the Course (Continued) • Part VII: Secure Object Data Management • Unit #18: Secure Object Data Management • Unit #19: Secure Distributed Objects and Modeling Applications • Unit #20: Secure Multimedia Data Systems • Part VIII: Data Warehousing, Data Mining and Security • Unit #21: Secure Data Warehousing • Unit #22: Data Mining for Security Applications • Unit #23: Privacy • Part IX: Secure Information Management • Unit #24: Secure Digital Libraries • Unit #25: Secure Semantic Web • Unit #26: Secure Information and Knowledge Management

  7. Outline of the Course (Continued) • Part X: Emerging Technologies • Unit #27: Secure Dependable Data Management • Unit #28: Secure Sensor and Wireless Data Management • Unit #29: Other Emerging Technologies • Unit #30 Conclusion to the Course

  8. Course Work • Two term papers; each worth 15 points • Dates: One week before mid-term and one week before final • Two exams each worth 20 points • Mid-term and Final exams • Programming project of your choice related to the course worth 30 points • Due day; the day of the final exam • Total 100 points • Course Book: Database and Applications Security: Integration Data Management and Info0rmation Security, Bhavani Thuraisingham, CRC Press, 2005 (pre-publication version will be used)

  9. Course Rules • Unless special permission is obtained from the instructor, each student will work incidviaully • Copying material from other sources will not be permitted unless the source is properly referenced • Any student who plagiarizes from other sources will be reported to the Computer Science department and any other committees as advices by the department

  10. Contact • For more information please contact • Dr. Bhavani Thuraisingham • Professor of Computer Science and • Director of Cyber Security Research Center Erik Jonsson School of Engineering and Computer Science EC31, The University of Texas at Dallas Richardson, TX 75080 • Phone: 972-883-4738 • Fax: 972-883-2399 • Email: bhavani.thuraisingham@utdallas.edu • URL: • http://www.cs.utdallas.edu/people/thuraisingham.html

  11. Appendix 1 (1/27/04) • Mid-Term Exam • Tuesday March 1, 2005 • Final Exam • Thursday April 28, 2005 (Tentative) • Term Paper I due: Thursday February 24, 2005 • Term Paper 2 due: Thursday April 21, 2005 • Programming project due: Thursday April 28, 2005 • If you need some inputs on your planned project or paper, please write an abstract and see me during the office hour

  12. Term Papers: Example Format • Abstract • Introduction • Background on the Topic • Survey of various techniques, designs etc, • Analyze the techniques, designs etc. and give your opinions • Directions for further work • Summary and Conclusions • References

  13. Term Papers: Example Format - II • Abstract • Introduction • Background on the Topic and Related Work • Give your own design • Discuss strengths and weaknesses of your work and others’ work • Directions for further work • Summary and Conclusions • References

  14. Some Topics for Papers • XML Security • Inference Problem • Privacy • Secure Biometrics • Intrusion Detection • E-Commerce Security • Secure Sensor Information Management • Secure Distributed Systems • Secure Semantic Web • Secure Data Warehousing • Insider Threat Analysis • Secure Multimedia Systems

  15. Project Report Format • Overview of the Project • Design of the System • Inputs/Outputs Examples • Analysis • Future Enhancements • References • Appendix A – Sample runs • Appendix B – Source code

  16. Project Report Format - II • Overview of the Project • Algorithms to be Simulated • Simulation Experiments • Input/Output Examples • Analysis • Future Enhancements • References • Appendix A – Sample runs • Appendix B – Source Code

  17. Some Project Topics • Query Modification on XML Documents • Access control for web systems • Intrusion detection system • Access control for multimedia systems • E.g., access control for image, video • Role-based access control system • Access control for object systems • Secure data warehouse

  18. Lecture Topics (January 11-March 17, 2005 – I) • January 11, 2005: Introduction to the course; Introduction to Data and applications security • January 13, 2005: Data Management • January 18, 2005: Information Management and Computer Security • January 20, 2005: Access Control • January 25, 2005: Multilevel Secure Database Systems • January 27, 2005: Multilevel Secure Database Systems - II • February 1, 2005: Guest Lecture: XML Security • February 3, 2005: Inference problem - I • February 8, 2005: Inference problem - II • February 10, 2005: Secure Distributed Databases • February 15, 2005: Secure Heterogeneous and federated Databases

  19. Lecture Topics: (January 11, 2005 – March 17, 2005 – II) • February 17, 2005: Secure Object Data Management • February 22, 2005: Secure Distributed Object Systems • February 24, 2005: Secure Multimedia Data Management • March 1, 2005: Mid-term Exam • March 3, 2005: Guest Lecture: Knowledge Management • March 8, 2005: Spring Break • March 10, 2005: Spring Break • March 15, 2005: Guest Lecture: Privacy Preserving Data Mining • March 17, 2005: Data Mining for Security Applications

  20. Lecture Topics: March 22, 2005 – April 21, 2005 • March 22, 2005: Secure Data Warehousing • March 24, 2005: Guest Lecture: Data Mining for Intrusion Detection • March 29, 2005: Privacy • March 31, 2005: Secure Web and Digital Libraries • April 5, 2005: Secure Knowledge Management • April 7, 2005: Secure Semantic Web • April 12, 2005: Secure Dependable Information Systems • April 14, 2005: Secure Sensor Information Systems • April 19, 2005: Biometrics • April 21, 2005: Guest Lecture • April 26, 2005 Exam week • April 28, 2005 Exam week

More Related