DOC PREVIEW
UTD CS 6V81 - Lecture #23 Secure Knowledge Management

This preview shows page 1-2-3-24-25-26 out of 26 pages.

Save
View full document
View full document
Premium Document
Do you want full access? Go Premium and unlock all 26 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 26 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 26 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 26 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 26 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 26 pages.
Access to all documents
Download any document
Ad free experience
Premium Document
Do you want full access? Go Premium and unlock all 26 pages.
Access to all documents
Download any document
Ad free experience

Unformatted text preview:

Data and Applications Security Developments and DirectionsOutline of the UnitReferencesWhat is Knowledge ManagementKnowledge Management ComponentsSlide 6Aspects of Secure Knowledge Management (SKM)SKM: Strategies, Processes, Metrics, TechniquesSlide 9Slide 10Security Policy Issues for Knowledge ManagementSecure Knowledge Management ArchitectureSKM for CoalitionsSKM Coalition ArchitectureSKM TechnologiesDirections for SKMWeb SecurityAttacks to Web SecuritySecure Web ComponentsE-Commerce TransactionsTypes of Transaction SystemsBuilding Database TransactionsSecure Digital LibrariesSlide 24Secure Web DatabasesDirections for Web SecurityData and Applications Security Developments and DirectionsDr. Bhavani ThuraisinghamThe University of Texas at DallasLecture #23Secure Knowledge Management: and Web SecurityMarch 31, 2008Outline of the UnitBackground on Knowledge ManagementSecure Knowledge ManagementConfidentiality, Privacy and TrustIntegrated SystemSecure Knowledge Management TechnologiesWeb Security and Digital LibrariesDirectionsReferencesProceedings Secure Knowledge Management Workshop-Secure Knowledge Management Workshop, Buffalo, NY, September 2004-http://www.cse.buffalo.edu/caeiae/skm2004/Secure Knowledge Management-Bertino, Khan, Sandhu and Thuraisingham-IEEE Transactions on Systems man and Cybernetics-This lecture is based on the above paperWhat is Knowledge ManagementKnowledge management, or KM, is the process through which organizations generate value from their intellectual property and knowledge-based assets KM involves the creation, dissemination, and utilization of knowledgeReference: http://www.commerce-database.com/knowledge-management.htm?source=googleKnowledge Management ComponentsComponents:StrategiesProcessesMetricsCycle:Knowledge, CreationSharing, Measurement And ImprovementTechnologies:Expert systemsCollaborationTrainingWebComponents ofKnowledge Management: Components,Cycle and TechnologiesIdentification CreationDiffusion - Tacit, ExplicitIntegration ModificationActionOrganizational Learning ProcessMetricsSource: Reinhardt and PawlowskyIncentivesAspects of Secure Knowledge Management (SKM)Protecting the intellectual property of an organizationAccess control including role-based access controlSecurity for process/activity management and workflow-Users must have certain credentials to carry out an activityComposing multiple security policies across organizationsSecurity for knowledge management strategies and processesRisk management and economic tradeoffsDigital rights management and trust negotiationSKM: Strategies, Processes, Metrics, TechniquesSecurity Strategies:-Policies and procedures for sharing data-Protecting intellectual property-Should be tightly integrated with business strategySecurity processes-Secure workflow-Processes for contracting, purchasing, order management, etc.Metrics-What is impact of security on number of documents published and other metrics gatheredTechniques-Access control, Trust managementSecurityStrategies: Policies,Plans, andProceduresSecurity Processes:Processes forWorkflow, Order Management, Contracting, - - -Technologies:Privacy PreservingData Mining, Secure Semantic WebComponents ofAspects ofSecure Knowledge ManagementSecurityMetrics:Security impact onMetrics gathered for data sharingSecurityTechniques:Access Control,Trust Management,- - - -SKM: Strategies, Processes, Metrics, TechniquesIdentification CreationDiffusion - Tacit, ExplicitIntegration ModificationActionSecurity Impact on Organizational Learning ProcessMetricsWhat are the restrictionsOn knowledge sharingBy incorporating securityIncentivesSecurity Policy Issues for Knowledge Management Defining Policies during Knowledge CreationRepresenting policies during knowledge managementEnforcing policies during knowledge manipulation and disseminationSecure Knowledge Management ArchitectureKnowledge Creation and Acquisition ManagerKnowledge RepresentationManagerKnowledge Manipulation And SustainmentManagerKnowledge Dissemination and TransferManagerDefine Security Policies Represent Security PoliciesEnforce Security Policies for accessEnforce Security Policies for disseminationSKM for CoalitionsOrganizations for federations and coalitions work together to solve a problem-Universities, Commercial corporation, Government agenciesChallenges is to share data/information and at the same time ensure security and autonomy for the individual organizationsHow can knowledge be shared across coalitions?SKM Coalition ArchitectureExportKnowledgeComponentKnowledge for Agency AKnowledge for CoalitionExportKnowledgeComponentKnowledge for Agency CComponentKnowledge for Agency BExportKnowledgeSKM TechnologiesData Mining-Mining the information and determine resources without violating securitySecure Semantic Web-Secure knowledge sharingSecure Annotation Management-Managing annotations about expertise and resources Secure content management-Markup technologies and related aspects for managing contentSecure multimedia information managementDirections for SKMWe have identified high level aspects of SKM-Strategies, Processes. Metrics, techniques, Technologies, ArchitectureNeed to investigate security issues-RBAC, UCON, Trust etc.CS departments should collaborate with business schools on KM and SKMWeb SecurityEnd-to-end security-Need to secure the clients, servers, networks, operating systems, transactions, data, and programming languages-The various systems when put together have to be secureComposable properties for securityAccess control rules, enforce security policies, auditing, intrusion detectionVerification and validationSecurity solutions proposed by W3C and OMGJava SecurityFirewallsDigital signatures and Message Digests, CryptographyAttacks to Web Security SecurityThreats andViolationsAccessControlViolationsIntegrityViolationsFraudDenial ofService/InfrastructureAttacksSabotageConfidentialityAuthenticationNonrepudiationViolationsSecure Web Components SecureWebComponentsSecureClientsSecureServersSecureMiddlewareSecureNetworksSecureDatabasesSecureProtocolsE-Commerce TransactionsE-commerce functions are carried out as transactions-Banking and trading on the internet-Each data transaction could contain many tasksDatabase transactions may be built on top of the data transaction service-Database transactions are needed for multiuser access to web


View Full Document

UTD CS 6V81 - Lecture #23 Secure Knowledge Management

Documents in this Course
Botnets

Botnets

33 pages

Privacy

Privacy

27 pages

Privacy

Privacy

27 pages

Load more
Download Lecture #23 Secure Knowledge Management
Our administrator received your request to download this document. We will send you the file to your email shortly.
Loading Unlocking...
Login

Join to view Lecture #23 Secure Knowledge Management and access 3M+ class-specific study document.

or
We will never post anything without your permission.
Don't have an account?
Sign Up

Join to view Lecture #23 Secure Knowledge Management 2 2 and access 3M+ class-specific study document.

or

By creating an account you agree to our Privacy Policy and Terms Of Use

Already a member?