Example: Data Mining for the NBA - The University of Texas at Dallas
Download
Report
Transcript Example: Data Mining for the NBA - The University of Texas at Dallas
Data and Applications Security
Developments and Directions
Dr. Bhavani Thuraisingham
The University of Texas at Dallas
Introduction to the Course
August 31, 2012
Objective of the Unit
This unit provides an overview of the course. The course describes
concepts, developments, challenges, and directions in data and
applications security. Topics include
- database security, distributed data management security, object
security, data warehouse security, data mining for security
applications, privacy, secure semantic web, secure digital
libraries, secure knowledge management and secure sensor
information management, biometrics
Outline of the Unit
Outline of Course
Course Work
Course Rules
Contact
Appendix
Outline of the Course
Unit #1: Introduction to Data and Applications
Part I: Background
- Unit #2: Data Management
- Unit #3: Information Security
- Unit #4: Information Management
Part II: Discretionary Security
- Unit #5: Concepts
- Unit #6: Policy Enforcement
Part III: Mandatory Security
- Unit #7: Concepts
- Unit #8: Architectures
Outline of the Course (Continued)
Part IV: Secure Relational Data Management
- Unit #9: Data Model
- Unit #10: Functions
- Unit #11: Prototypes and Products
Part V: Inference Problem
- Unit #12: Concepts
- Unit #13: Constraint Processing
- Unit #14: Conceptual Structures
Part VI: Secure Distributed Data Management
- Unit #15: Secure Distributed data management
- Unit #16: Secure Heterogeneous Data Integration
- Unit #17: Secure Federated Data Management
Outline of the Course (Continued)
Part VII: Secure Object Data Management
-
Unit #18: Secure Object Management
Unit #19: Secure Distributed Objects and Modeling Applications
Unit #20: Secure Multimedia Systems
Part VIII: Data Warehousing, Data Mining and Security
-
Unit #21: Secure Data Warehousing
Unit #22: Data Mining for Security Applications
Unit #23: Privacy
Part IX: Secure Information Management
-
Unit #24: Secure Digital Libraries
- Unit #25: Secure Semantic Web (web services, XML security)
-
Unit #26: Secure Information and Knowledge Management
Outline of the Course (Continued)
Part X: Emerging Technologies
- Unit #27: Secure Dependable Data Management
- Unit #28: Secure Sensor and Wireless Data Management
- Unit #29: Other Emerging Technologies
Unit #30 Conclusion to the Course
Guest Lectures Some guest lectures may be included
Insider Threat
Additional Topics including
Secure Web Services
Social network security and privacy
Secure cloud computing
Review for finals
Tentative Schedule
August 31: Introduction
September 7: Policies and Access Control
September 14: Multilevel Data Management
September 21: Inference Problem
September 28: Secure Distributed and Object Data Management
October 5: Data Warehousing, Data Mining, Security and Privacy
October 12: Secure Web Services and Review for Exam
October 19: Exam #1
October 26: Secure semantic web and XML security
November 2: Secure Cloud Computing
November 9: Secure Knowledge Management and Social Networking
November 16: Secure Dependable Data Management, Digital Forensics
November 23: Holiday
November 30: Mobile phone security and special topics
December 7: Selected project presentations and review
December 14: Exam #2
Tentative Schedule
Assignment #1 due date: September 21, 2012
Assignment #2: due date: September 28, 2012
Term #1: October 12, 2012
Exam #1: October 19, 2012
Assignment #3: October 26, 2012
Assignment #4: November 2, 2012 (due date: November 16, 2012)
Term paper #2: November 9, 2012
Project: November 30, 2012
Exam #2: December 14, 2012
Course Work
Two term papers; each worth 8 points
Two exams each worth 24 points
Programming project worth 12 points
Four homework assignments each worth 6 points
Total 100 points
Course Book: Database and Applications Security:
Integration Data Management and Information Security,
Bhavani Thuraisingham, CRC Press, 2005
Will also include papers as reading material
Some Topics for Papers
XML Security
Inference Problem
Privacy
Secure Biometrics
Intrusion Detection
E-Commerce Security
Secure Sensor Information Management
Secure Distributed Systems
Secure Semantic Web
Secure Data Warehousing
Insider Threat Analysis
Secure Multimedia Systems
Term Papers: Example Format
Abstract
Introduction
Background on the Topic
Survey of various techniques, designs etc,
Analyze the techniques, designs etc. and give your opinions
Directions for further work
Summary and Conclusions
References
Term Papers: Example Format - II
Abstract
Introduction
Background on the Topic and Related Work
Discuss strengths and weaknesses of your work and others’
work
Give your own design
Directions for further work
Summary and Conclusions
References
Project Report Format
Overview of the Project
Design of the System
Input/Output
Future Enhancements
References
Some Project Topics
Quivery Modification on XML Documents
Access control for web systems
Intrusion detection system
Access control for multimedia systems
- E.g., access control for image, video
Role-based access control system
Access control for object systems
Secure data warehouse
Course Rules
Course attendance is mandatory; unless permission is obtained
from instructor for missing a class with a valid reason
(documentation needed for medical emergency for student or a
close family member – e.g., spouse, parent, child). Attendance will
be collected every lecture. 3 points will be deducted out of 100 for
each lecture missed without approval.
Each student will work individually
Late assignments will not be accepted. All assignments have to be
turned in just after the lecture on the due date
No make up exams unless student can produce a medical certificate
or give evidence of close family emergency
Copying material from other sources will not be permitted unless the
source is properly referenced
Any student who plagiarizes from other sources will be reported to
the appropriate UTD authroities
Assignment #1, 2, 3, 4
Assignment #1: Posted in Lecture #7
Assignment #2 Posted in Lecture #11
Assignment #3: Posted in Lecture #17
Assignment #4: Posted in Lecture # 22
Contact
For more information please contact
- Dr. Bhavani Thuraisingham
- Professor of Computer Science and
- Director of Cyber Security Research Center Erik Jonsson School
of Engineering and Computer Science EC31, The University of
Texas at Dallas Richardson, TX 75080
- Phone: 972-883-4738
- Fax: 972-883-2399
- Email: [email protected]
- URL:http://www.utdallas.edu/~bxt043000/
Papers to Read for Exam #1
- RBAC: Ravi S. Sandhu, Edward J. Coyne, Hal L. Feinstein,
Charles E. Youman: Role-Based Access Control Models. IEEE
Computer 29(2): 38-47 (1996)
- UCON: Jaehong Park, Ravi S. Sandhu: The UCONABC usage
control model. ACM Trans. Inf. Syst. Secur. 7(1): 128-174 (2004)
- Read the first 20 pages (sections 1, 2, 3)
- DCON: Roshan K. Thomas, Ravi S. Sandhu: Towards a Multidimensional Characterization of Dissemination Control. POLICY
2004: 197-200 (IEEE)
- Pallabi Parveen, Jonathan Evans, Bhavani M. Thuraisingham,
Kevin W. Hamlen, Latifur Khan: Insider Threat Detection Using
Stream Mining and Graph Mining. SocialCom/PASSAT 2011:
1102-1110
Papers to Read for Exam #1
- Bhavani M. Thuraisingham: Mandatory Security in ObjectOriented Database Systems. OOPSLA 1989: 203-210
- Bhavani M. Thuraisingham, William Ford: Security Constraints in
a Multilevel Secure Distributed Database Management System.
IEEE Trans. Knowl. Data Eng. 7(2): 274-293 (1995)
- Rakesh Agrawal, Ramakrishnan Srikant: Privacy-Preserving
Data Mining. SIGMOD Conference 2000: 439-450
- Optional paper
Mohammad M. Masud, Jing Gao, Latifur Khan, Jiawei Han,
Bhavani M. Thuraisingham: Classification and Novel Class
Detection in Concept-Drifting Data Streams under Time
Constraints. IEEE Trans. Knowl. Data Eng. 23(6): 859-874
(2011)
Index to Lectures for Exam #1
Lecture 1: Data and Applications Security 8/31/2012
Lecture 2: Cyber Security Modules 8/31/2012 (extra credit)
Lecture 3: Background on data management (no date)
Lecture 4: Access Control (9/7/2012)
Lecture 5: Policies (9/7/2012)
Lecture 6: Multilevel Secure Data Management (Taped, 9/14/2012)
Lecture 7: Assignment #1
Lecture 8: Ms Parveen Lecture Insider threat (9/14/2012)
Lecture 9: Inference Problem 1 (9/21/2012)
Lecture 10: Inference Problem 2 (9/21/2012)
Lecture 11: Assignment #2
Lecture 12: Secure Distributed Data Management (9/28/2012)
Index to Lectures for Exam #1
Lecture 13: Secure Object System (9/28/2012)
Lecture 14: Secure Data Warehousing (10/5/2012)
Lecture 15: Data Mining for Malware Detection (10/12/2012)
Lecture 16: Privacy (10/5/2012)
Lecture 17: Assignment #3
Questions:
Discretionary security, Policies, Multilevel Data Management,
Security Constraint processing for inference control,, Semantic net
for inference control, Secure distributed data management and
information sharing, Secure object and geospatial data, Secure data
warehousing with examples, Privacy including privacy preserving
data mining, Data mining for malware detection including insider
threat
Extra credit – Lecture #2
Papers to Read for Exam #2
Abhijith Shastry, Murat Kantarcioglu, Yan Zhou, Bhavani M.
Thuraisingham: Randomizing Smartphone Malware Profiles
against Statistical Mining Techniques. DBSec 2012: 239-254
Barbara Carminati, Elena Ferrari, Raymond Heatherly, Murat
Kantarcioglu, Bhavani M. Thuraisingham: A semantic web
based framework for social network access control. SACMAT
2009: 177-186
Elisa Bertino, Barbara Carminati, Elena Ferrari, Bhavani M.
Thuraisingham, Amar Gupta: Selective and Authentic ThirdParty Distribution of XML Documents. IEEE Trans. Knowl.
Data Eng. 16(10): 1263-1278 (2004)
Index to Lectures for Exam #2
What is in red will not be included in exam #2
Lecture 18: Secure Web Services (10/12/2012) - 1
Lecture 19: Trustworthy semantic web (10/26/2012?) - 1
Lecture 20: XML security (10/26/2012?) - 1
Lecture 21: Introduction to semantic web (10/26/2012?)
Lecture 22: Assignment #4
Lecture 23: Secure cloud computing introduction (11/2/2012)
– 0.5
Lecture 24: Secure cloud computing prototypes at UTD (11/2)
– 0.5
* Lecture 25: Secure Knowledge Management and Web
Security (11/9/2012) - 1
Lecture 26: Secure Social Networks (11/9/2012) - 1
Index to Lectures for Exam #2
Lecture 27: Dependable Data Management (11/16/2012) – 1
Lecture 28: Digital Forensics and Biometrics (11/16/2012) - 1
Lecture 29: Guest Lecture: Satyen Abrol (11/16/2012)
Lecture 30: Virtualization Security (11/30/2012) - 1
Lecture 31: Smartphone malware and security (11/30/2012) - 1
Lecture 32: Guest Lecture – Dr. Latifur Khan (12/7/2012)
Extra credit: any question from the lectures