Introduction - The University of Texas at Dallas
Download
Report
Transcript Introduction - The University of Texas at Dallas
Data and Applications Security
Developments and Directions
Dr. Bhavani Thuraisingham
The University of Texas at Dallas
Introduction to the Course
January 11, 2005
Objective of the Unit
This unit provides an overview of the course. The course describes
concepts, developments, challenges, and directions in data and
applications security. Topics include
- database security, distributed data management security, object
security, data warehouse security, data mining for security
applications, privacy, secure semantic web, secure digital
libraries, secure knowledge management and secure sensor
information management.
Outline of the Unit
Outline of Course
Course Work
Course Rules
Contact
Appendix
Outline of the Course
Unit #1: Introduction to Data and Applications
Part I: Background
- Unit #2: Data Management
- Unit #3: Information Security
- Unit #4: Information Management
Part II: Discretionary Security
- Unit #5: Concepts
- Unit #6: Policy Enforcement
Part III: Mandatory Security
- Unit #7: Concepts
- Unit #8: Architectures
Outline of the Course (Continued)
Part IV: Secure Relational Data Management
- Unit #9: Data Model
- Unit #10: Functions
- Unit #11: Prototypes and Products
Part V: Inference Problem
- Unit #12: Concepts
- Unit #13: Constraint Processing
- Unit #14: Conceptual Structures
Part VI: Secure Distributed Data Management
- Unit #15: Secure Distributed Databases
- Unit #16: Secure Heterogeneous Database Integration
- Unit #17: Secure Federated Database Management
Outline of the Course (Continued)
Part VII: Secure Object Data Management
- Unit #18: Secure Object Data Management
- Unit #19: Secure Distributed Objects and Modeling Applications
- Unit #20: Secure Multimedia Data Systems
Part VIII: Data Warehousing, Data Mining and Security
- Unit #21: Secure Data Warehousing
- Unit #22: Data Mining for Security Applications
- Unit #23: Privacy
Part IX: Secure Information Management
- Unit #24: Secure Digital Libraries
- Unit #25: Secure Semantic Web
- Unit #26: Secure Information and Knowledge Management
Outline of the Course (Continued)
Part X: Emerging Technologies
- Unit #27: Secure Dependable Data Management
- Unit #28: Secure Sensor and Wireless Data Management
- Unit #29: Other Emerging Technologies
Unit #30 Conclusion to the Course
Course Work
Two term papers; each worth 15 points
- Dates: One week before mid-term and one week before final
Two exams each worth 20 points
- Mid-term and Final exams
Programming project of your choice related to the course worth 30
points
- Due day; the day of the final exam
Total 100 points
Course Book: Database and Applications Security: Integration Data
Management and Info0rmation Security, Bhavani Thuraisingham,
CRC Press, 2005 (pre-publication version will be used)
Course Rules
Unless special permission is obtained from the instructor, each
student will work incidviaully
Copying material from other sources will not be permitted unless the
source is properly referenced
Any student who plagiarizes from other sources will be reported to
the Computer Science department and any other committees as
advices by the department
Contact
For more information please contact
- Dr. Bhavani Thuraisingham
- Professor of Computer Science and
- Director of Cyber Security Research Center Erik Jonsson School
of Engineering and Computer Science EC31, The University of
Texas at Dallas Richardson, TX 75080
- Phone: 972-883-4738
- Fax: 972-883-2399
- Email: [email protected]
- URL:
- http://www.cs.utdallas.edu/people/thuraisingham.html
Appendix 1 (1/27/04)
Mid-Term Exam
- Tuesday March 1, 2005
Final Exam
- Thursday April 28, 2005 (Tentative)
Term Paper I due: Thursday February 24, 2005
Term Paper 2 due: Thursday April 21, 2005
Programming project due: Thursday April 28, 2005
If you need some inputs on your planned project or paper,
please write an abstract and see me during the office hour
Term Papers: Example Format
Abstract
Introduction
Background on the Topic
Survey of various techniques, designs etc,
Analyze the techniques, designs etc. and give your opinions
Directions for further work
Summary and Conclusions
References
Term Papers: Example Format - II
Abstract
Introduction
Background on the Topic and Related Work
Give your own design
Discuss strengths and weaknesses of your work and others’
work
Directions for further work
Summary and Conclusions
References
Some Topics for Papers
XML Security
Inference Problem
Privacy
Secure Biometrics
Intrusion Detection
E-Commerce Security
Secure Sensor Information Management
Secure Distributed Systems
Secure Semantic Web
Secure Data Warehousing
Insider Threat Analysis
Secure Multimedia Systems
Project Report Format
Overview of the Project
Design of the System
Inputs/Outputs Examples
Analysis
Future Enhancements
References
Appendix A – Sample runs
Appendix B – Source code
Project Report Format - II
Overview of the Project
Algorithms to be Simulated
Simulation Experiments
Input/Output Examples
Analysis
Future Enhancements
References
Appendix A – Sample runs
Appendix B – Source Code
Some Project Topics
Query Modification on XML Documents
Access control for web systems
Intrusion detection system
Access control for multimedia systems
- E.g., access control for image, video
Role-based access control system
Access control for object systems
Secure data warehouse
Lecture Topics (January 11-March 17, 2005 – I)
January 11, 2005: Introduction to the course; Introduction to
Data and applications security
January 13, 2005: Data Management
January 18, 2005: Information Management and Computer
Security
January 20, 2005: Access Control
January 25, 2005: Multilevel Secure Database Systems
January 27, 2005: Multilevel Secure Database Systems - II
February 1, 2005: Guest Lecture: XML Security
February 3, 2005: Inference problem - I
February 8, 2005: Inference problem - II
February 10, 2005: Secure Distributed Databases
February 15, 2005: Secure Heterogeneous and federated
Databases
Lecture Topics:
(January 11, 2005 – March 17, 2005 – II)
February 17, 2005: Secure Object Data Management
February 22, 2005: Secure Distributed Object Systems
February 24, 2005: Secure Multimedia Data Management
March 1, 2005: Mid-term Exam
March 3, 2005: Guest Lecture: Knowledge Management
March 8, 2005: Spring Break
March 10, 2005: Spring Break
March 15, 2005: Guest Lecture: Privacy Preserving Data
Mining
March 17, 2005: Data Mining for Security Applications
Lecture Topics: March 22, 2005 – April 21, 2005
March 22, 2005: Secure Data Warehousing
March 24, 2005: Guest Lecture: Data Mining for Intrusion
Detection
March 29, 2005: Privacy
March 31, 2005: Secure Web and Digital Libraries
April 5, 2005: Secure Knowledge Management
April 7, 2005: Secure Semantic Web
April 12, 2005: Secure Dependable Information Systems
April 14, 2005: Secure Sensor Information Systems
April 19, 2005: Biometrics
April 21, 2005: Guest Lecture
April 26, 2005 Exam week
April 28, 2005 Exam week