DOC PREVIEW
UTD CS 6V81 - Lecture #3 Supporting Technologies

This preview shows page 1-2-15-16-31-32 out of 32 pages.

Save
View full document
View full document
Premium Document
Do you want full access? Go Premium and unlock all 32 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 32 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 32 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 32 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 32 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 32 pages.
Access to all documents
Download any document
Ad free experience
Premium Document
Do you want full access? Go Premium and unlock all 32 pages.
Access to all documents
Download any document
Ad free experience

Unformatted text preview:

Data and Applications Security Developments and DirectionsPart I: Information ManagementOutline of Part IRevisiting the DM/IM/KM FrameworkWhat is Information Management?Data WarehouseMultidimensional Data ModelData MiningMultimedia Information ManagementExtracting Relations from Text for Mining: An ExampleImage Processing: Example: Change Detection:Semantic WebSemantic Web TechnologiesInformation Management for CollaborationSome Emerging Information Management TechnologiesWhat is Knowledge Management?Knowledge Management ComponentsSlide 18Part II: Information SecurityOutline of Part IIOperating System SecurityMandatory SecurityCovert Channel ExampleNetwork SecuritySteps to Designing a Secure SystemProduct EvaluationSecurity Threats to Web/E-commerceApproaches and SolutionsE-Commerce TransactionsTypes of Transaction SystemsWhat is E-Cash?Other Security TechnologiesData and Applications Security Developments and DirectionsDr. Bhavani ThuraisinghamThe University of Texas at DallasLecture #3Supporting Technologies: Information Management and Information SecurityJanuary 18, 2005Part I: Information ManagementThis unit gives an overview of various information management technologies. These technologies make use of data management technologiesOutline of Part IInformation Management FrameworkInformation Management OverviewSome Information Management TechnologiesKnowledge ManagementRevisiting the DM/IM/KM FrameworkInformationManagementDatabaseSystems InformationRetrieval Data WarehouseSecurityDistributed andHeterogeneousDatabase SecurityObject DatabaseSecurityPrivacy Secure KnowledgeDigitalForensicsWebSensorDatabaseSecurityRelationalDatabaseSecurityInferenceProblemSecureInformationManagementTechnologiesData MiningAnd SecurityDatabaseSecurityDependableInformationManagementKnowledgeManagement Information andComputerSecurityBiometricsSecure DigitalLibrariesInformationManagement DatabaseSystems InformationRetrieval Data WarehouseSecurity Distributed/Federated DataSecurity Object/MultimediaSecurity PrivacySecure KnowledgeDigitalForensicsWebSensorDatabaseSecurityRelationalDatabaseSecurityInferenceProblemSecureInformationManagementTechnologiesData MiningAnd SecurityDatabaseSecurity DependableInformationManagementKnowledgeManagement Information andComputerSecurity BiometricsSecure SemanticWeb InformationManagementDatabaseSystems InformationRetrieval Data WarehouseSecurityDistributed andHeterogeneousDatabase SecurityObject DatabaseSecurityPrivacy Secure KnowledgeDigitalForensicsWebSensorDatabaseSecurityRelationalDatabaseSecurityInferenceProblemSecureInformationManagementTechnologiesData MiningAnd SecurityDatabaseSecurityDependableInformationManagementKnowledgeManagement Information andComputerSecurityBiometricsSecure DigitalLibrariesInformationManagement DatabaseSystems InformationRetrieval Data WarehouseSecurity Distributed/Federated DataSecurity Object/MultimediaSecurity PrivacySecure KnowledgeDigitalForensicsWebSensorDatabaseSecurityRelationalDatabaseSecurityInferenceProblemSecureInformationManagementTechnologiesData MiningAnd SecurityDatabaseSecurity DependableInformationManagementKnowledgeManagement Information andComputerSecurity BiometricsSecure SemanticWeb InformationManagementDatabaseSystems InformationRetrieval Data WarehouseSecurityDistributed andHeterogeneousDatabase SecurityObject DatabaseSecurityPrivacy Secure KnowledgeDigitalForensicsWebSensorDatabaseSecurityRelationalDatabaseSecurityInferenceProblemSecureInformationManagementTechnologiesData MiningAnd SecurityDatabaseSecurityDependableInformationManagementKnowledgeManagement Information andComputerSecurityBiometricsSecure DigitalLibrariesData ManagementTechnologiesHeterogeneous DatabaseManagement Relational DatabaseSystems SecureDatabase SystemsData Warehouse SystemsPeer-to-PeerInformation ManagementMultimedia InformationSystemKnowledgePortalsKnowledge Creationand AcquisitionKnowledgeMiningWebSensorInformationManagementData MiningSemanticWebExpert systems andReasoning under uncertaintyKnowledgeSharingInformationManagementKnowledgeManipulationDistributedDatabasesObject DatabaseKnowledgeModelsKnowledgeRepresentationKnowledge ManagementTechnologiesInformation ManagementTechnologiesEach layer builds on the technologies of the lower layersWhat is Information Management?Information management essentially analyzes the data and makes sense out of the dataSeveral technologies have to work together for effective information management-Data Warehousing: Extracting relevant data and putting this data into a repository for analysis-Data Mining: Extracting information from the data previously unknown-Multimedia: managing different media including text, images, video and audio-Web: managing the databases and libraries on the webData WarehouseOracleDBMS forEmployeesSybaseDBMS forProjectsInformixDBMS forMedicalData Warehouse:Data correlatingEmployees WithMedical Benefitsand ProjectsCould beany DBMS; Usually based on the relational data modelUsersQuerythe WarehouseMultidimensional Data ModelProject NameProject LeaderProject SponsorProject CostProject DurationDollarsPoundsYenYearsMonthsWeeksProject NameProject LeaderProject SponsorProject CostProject DurationDollarsPoundsYenYearsMonthsWeeksData MiningData MiningKnowledge MiningKnowledge Discoveryin DatabasesData ArchaeologyData DredgingDatabase MiningKnowledge ExtractionData Pattern ProcessingInformation HarvestingSiftwareThe process of discovering meaningful new correlations, patterns, and trends by sifting through large amounts of data, often previously unknown, using pattern recognition technologies and statistical and mathematical techniques(Thuraisingham 1998)Multimedia Information ManagementVideoSourceScene ChangeDetectionSpeakerChangeDetectionSilenceDetectionCommercialDetectionKey FrameSelectionStorySegmentationNamedEntityTaggingBroadcast News Editor (BNE)Broadcast NewsNavigator (BNN)Video andMetadataMultimediaDatabaseManagementSystemWeb-based Search/Browse by Program, Person, Location, ...ImageryAudioClosedCaptionTextSegregate VideoStreamsAnalyze and Store Video and MetadataStoryGIST ThemeFrameClassifierClosedCaptionPreprocessCorrelationToken DetectionBroadcastDetectionExtracting Relations from Text for Mining: An ExampleTextCorpusRepositoryConceptExtractionAssociationRuleProductPerson1 Person2Natalie Allen Linden Soles 117Leon Harris Joie Chen 53Ron Goldman Nicole Simpson 19. . .Mobotu SeseSekoLaurent Kabila 10Goal: FindCooperating/Combating Leadersin a


View Full Document

UTD CS 6V81 - Lecture #3 Supporting Technologies

Documents in this Course
Botnets

Botnets

33 pages

Privacy

Privacy

27 pages

Privacy

Privacy

27 pages

Load more
Download Lecture #3 Supporting Technologies
Our administrator received your request to download this document. We will send you the file to your email shortly.
Loading Unlocking...
Login

Join to view Lecture #3 Supporting Technologies and access 3M+ class-specific study document.

or
We will never post anything without your permission.
Don't have an account?
Sign Up

Join to view Lecture #3 Supporting Technologies 2 2 and access 3M+ class-specific study document.

or

By creating an account you agree to our Privacy Policy and Terms Of Use

Already a member?