DOC PREVIEW
UTD CS 6V81 - CS 6V81 Assignment #1 on Access Control and Policies

This preview shows page 1-2 out of 5 pages.

Save
View full document
View full document
Premium Document
Do you want full access? Go Premium and unlock all 5 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 5 pages.
Access to all documents
Download any document
Ad free experience
Premium Document
Do you want full access? Go Premium and unlock all 5 pages.
Access to all documents
Download any document
Ad free experience

Unformatted text preview:

Data and Applications Security Developments and DirectionsReferencesProblem #1Problem #2Problem #3Data and Applications Security Developments and DirectionsDr. Bhavani ThuraisinghamThe University of Texas at DallasLecture #5Assignment #1 on Access Control and PoliciesFebruary 2, 2009ReferencesLecture NotesText Book for ClassAdditional Papers-RBAC: Ravi S. Sandhu, Edward J. Coyne, Hal L. Feinstein, Charles E. Youman: Role-Based Access Control Models. IEEE Computer 29(2): 38-47 (1996) -UCON: Jaehong Park, Ravi S. Sandhu: The UCONABC usage control model. ACM Trans. Inf. Syst. Secur. 7(1): 128-174 (2004) -http://delivery.acm.org/10.1145/510000/507722/p57-park.pdf?key1=507722&key2=2341065321&coll=ACM&dl=ACM&CFID=23616711&CFTOKEN=10325487-DCON: Roshan K. Thomas, Ravi S. Sandhu: Towards a Multi-dimensional Characterization of Dissemination Control. POLICY 2004: 197-200 (IEEE)Problem #1Consider an example application (e.g., from healthcare, defense, financial)Specify some meaningful policies for this application that address confidentiality, privacy and trustProblem #2Consider an example application where there is a need for organizations to share data-Example: Defense: Army, Navy, Air Force-Healthcare: Doctor, Hospital, Insurance companyGive meaningful security policies illustrating the need for organizations share data and yet having to enforce the policies-Policies may include confidentiality, privacy and trustProblem #3Read the papers on RBAC, UCON and DCON listed in this unitFor an example application (or applications) specify policies for RBAC, UCON and


View Full Document

UTD CS 6V81 - CS 6V81 Assignment #1 on Access Control and Policies

Documents in this Course
Botnets

Botnets

33 pages

Privacy

Privacy

27 pages

Privacy

Privacy

27 pages

Load more
Download CS 6V81 Assignment #1 on Access Control and Policies
Our administrator received your request to download this document. We will send you the file to your email shortly.
Loading Unlocking...
Login

Join to view CS 6V81 Assignment #1 on Access Control and Policies and access 3M+ class-specific study document.

or
We will never post anything without your permission.
Don't have an account?
Sign Up

Join to view CS 6V81 Assignment #1 on Access Control and Policies 2 2 and access 3M+ class-specific study document.

or

By creating an account you agree to our Privacy Policy and Terms Of Use

Already a member?