Introduction - The University of Texas at Dallas

Download Report

Transcript Introduction - The University of Texas at Dallas

Data and Applications Security
Developments and Directions
Dr. Bhavani Thuraisingham
The University of Texas at Dallas
Introduction to the Course
January 9, 2006
Objective of the Unit
 This unit provides an overview of the course. The course describes
concepts, developments, challenges, and directions in data and
applications security. Topics include
- database security, distributed data management security, object
security, data warehouse security, data mining for security
applications, privacy, secure semantic web, secure digital
libraries, secure knowledge management and secure sensor
information management, biometrics
Outline of the Unit
 Outline of Course
 Course Work
 Course Rules
 Contact
 Appendix
Outline of the Course
 Unit #1: Introduction to Data and Applications
 Part I: Background
- Unit #2: Data Management
- Unit #3: Information Security
- Unit #4: Information Management
 Part II: Discretionary Security
- Unit #5: Concepts
- Unit #6: Policy Enforcement
 Part III: Mandatory Security
- Unit #7: Concepts
- Unit #8: Architectures
Outline of the Course (Continued)
 Part IV: Secure Relational Data Management
- Unit #9: Data Model
- Unit #10: Functions
- Unit #11: Prototypes and Products
 Part V: Inference Problem
- Unit #12: Concepts
- Unit #13: Constraint Processing
- Unit #14: Conceptual Structures
 Part VI: Secure Distributed Data Management
- Unit #15: Secure Distributed data management
- Unit #16: Secure Heterogeneous Data Integration
- Unit #17: Secure Federated Data Management
Outline of the Course (Continued)
 Part VII: Secure Object Data Management
- Unit #18: Secure Object Management
- Unit #19: Secure Distributed Objects and Modeling Applications
- Unit #20: Secure Multimedia Systems
 Part VIII: Data Warehousing, Data Mining and Security
- Unit #21: Secure Data Warehousing
- Unit #22: Data Mining for Security Applications
- Unit #23: Privacy
 Part IX: Secure Information Management
- Unit #24: Secure Digital Libraries
- Unit #25: Secure Semantic Web
- Unit #26: Secure Information and Knowledge Management
Outline of the Course (Continued)
 Part X: Emerging Technologies
- Unit #27: Secure Dependable Data Management
- Unit #28: Secure Sensor and Wireless Data Management
- Unit #29: Other Emerging Technologies

Digital Forensics, Biometrics etc.
 Unit #30 Conclusion to the Course
 Guest Lectures by Mr. David Russo, Senior Lecturer
Course Work (4V95)
 Two exams each worth 20 points
- Mid-term and Final exams
 Programming project worth 30 points
- Due date; the day of the final exam
 Two homework assignments worth 15 points each
- Due day; mid-term and last day of class
- OR 2 term papers OR Combination
 Total 100 points
 Course Book: Database and Applications Security: Integration
Data Management and Information Security, Bhavani
Thuraisingham, CRC Press, 2005
Course Work (5V81)
 Two term papers; each worth 15 points
- Dates: One week before mid-term and one week before
final
 Two exams each worth 15 points
- Mid-term and Final exams
 Programming project worth 20 points
- Due day; the day of the final exam
 Two homework assignments worth 10 points each
- Due day; mid-term and last day of class
- OR additional paper (Flexible)
 Total 100 points
 Course Book: Database and Applications Security: Integration
Data Management and Information Security, Bhavani
Thuraisingham, CRC Press, 2005
Some Topics for Papers
 XML Security
 Inference Problem
 Privacy
 Secure Biometrics
 Intrusion Detection
 E-Commerce Security
 Secure Sensor Information Management
 Secure Distributed Systems
 Secure Semantic Web
 Secure Data Warehousing
 Insider Threat Analysis
 Secure Multimedia Systems
Term Papers: Example Format
 Abstract
 Introduction
 Background on the Topic
 Survey of various techniques, designs etc,
 Analyze the techniques, designs etc. and give your opinions
 Directions for further work
 Summary and Conclusions
 References
Term Papers: Example Format - II
 Abstract
 Introduction
 Background on the Topic and Related Work
 Give your own design
 Discuss strengths and weaknesses of your work and others’
work
 Directions for further work
 Summary and Conclusions
 References
Project Report Format
 Overview of the Project
 Design of the System
 Input/Output
 Future Enhancements
 References
Some Project Topics
 Quivery Modification on XML Documents
 Access control for web systems
 Intrusion detection system
 Access control for multimedia systems
- E.g., access control for image, video
 Role-based access control system
 Access control for object systems
 Secure data warehouse
Course Rules
 Unless special permission is obtained from the instructor, each
student will work incidviaully
 Copying material from other sources will not be permitted unless the
source is properly referenced
 Any student who plagiarizes from other sources will be reported to
the Computer Science department and any other committees as
advices by the department
Contact
 For more information please contact
- Dr. Bhavani Thuraisingham
- Professor of Computer Science and
- Director of Cyber Security Research Center Erik Jonsson School
of Engineering and Computer Science EC31, The University of
Texas at Dallas Richardson, TX 75080
- Phone: 972-883-4738
- Fax: 972-883-2399
- Email: [email protected]
- URL:
- http://www.cs.utdallas.edu/people/thuraisingham.html