This preview shows page 1-2-21-22 out of 22 pages.

Save
View full document
View full document
Premium Document
Do you want full access? Go Premium and unlock all 22 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 22 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 22 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 22 pages.
Access to all documents
Download any document
Ad free experience
Premium Document
Do you want full access? Go Premium and unlock all 22 pages.
Access to all documents
Download any document
Ad free experience

Unformatted text preview:

Data and Applications Security Developments and DirectionsObjective of the UnitOutline of the UnitOutline of the CourseOutline of the Course (Continued)Slide 6Slide 7Course WorkSlide 9Some Topics for PapersTerm Papers: Example FormatTerm Papers: Example Format - IIProject Report FormatSome Project TopicsIndex to LecturesSlide 16Index to Lectures for Exam 2Index to Lectures for Exam 2Papers to read for exam #1Papers to read for exam #2Course RulesContactData and Applications Security Developments and DirectionsDr. Bhavani ThuraisinghamThe University of Texas at DallasIntroduction to the CourseAugust 24, 2011Objective of the UnitThis unit provides an overview of the course. The course describes concepts, developments, challenges, and directions in data and applications security. Topics include -database security, distributed data management security, object security, data warehouse security, data mining for security applications, privacy, secure semantic web, secure digital libraries, secure knowledge management and secure sensor information management, biometricsOutline of the UnitOutline of CourseCourse WorkCourse RulesContactAppendixOutline of the CourseUnit #1: Introduction to Data and Applications Part I: Background-Unit #2: Data Management-Unit #3: Information Security-Unit #4: Information Management Part II: Discretionary Security-Unit #5: Concepts-Unit #6: Policy EnforcementPart III: Mandatory Security-Unit #7: Concepts-Unit #8: ArchitecturesOutline of the Course (Continued)Part IV: Secure Relational Data Management-Unit #9: Data Model-Unit #10: Functions-Unit #11: Prototypes and ProductsPart V: Inference Problem-Unit #12: Concepts-Unit #13: Constraint Processing-Unit #14: Conceptual StructuresPart VI: Secure Distributed Data Management-Unit #15: Secure Distributed data management-Unit #16: Secure Heterogeneous Data Integration-Unit #17: Secure Federated Data ManagementOutline of the Course (Continued)Part VII: Secure Object Data Management-Unit #18: Secure Object Management-Unit #19: Secure Distributed Objects and Modeling Applications-Unit #20: Secure Multimedia SystemsPart VIII: Data Warehousing, Data Mining and Security -Unit #21: Secure Data Warehousing-Unit #22: Data Mining for Security Applications-Unit #23: PrivacyPart IX: Secure Information Management-Unit #24: Secure Digital Libraries -Unit #25: Secure Semantic Web (web services, XML security) -Unit #26: Secure Information and Knowledge ManagementOutline of the Course (Continued)Part X: Emerging Technologies -Unit #27: Secure Dependable Data Management-Unit #28: Secure Sensor and Wireless Data Management -Unit #29: Other Emerging TechnologiesUnit #30 Conclusion to the CourseGuest Lectures Some guest lectures may be included Some other topicsReview for finalsCourse WorkOne term paper; each worth 10 points-November 16Two exams each worth 20 points-Exam #1: October 19-Exam #2: As scheduled by UTD; December 9, 2011Programming project worth 12 points: December 5Four homework assignments each worth 6 points -September 28; October 12; November 9; November 30Total 86 pointsMay be given a surprise quiz (4 points)Total 90Course WorkCourse Book: Database and Applications Security: Integration Data Management and Information Security, Bhavani Thuraisingham, CRC Press, 2005Will also include papers as reading materialSome Topics for PapersXML SecurityInference ProblemPrivacySecure BiometricsIntrusion DetectionE-Commerce SecuritySecure Sensor Information ManagementSecure Distributed SystemsSecure Semantic WebSecure Data WarehousingInsider Threat AnalysisSecure Multimedia SystemsTerm Papers: Example FormatAbstractIntroductionBackground on the TopicSurvey of various techniques, designs etc,Analyze the techniques, designs etc. and give your opinionsDirections for further workSummary and ConclusionsReferencesTerm Papers: Example Format - IIAbstractIntroductionBackground on the Topic and Related WorkDiscuss strengths and weaknesses of your work and others’ workGive your own designDirections for further workSummary and ConclusionsReferencesProject Report FormatOverview of the ProjectDesign of the SystemInput/Output Future EnhancementsReferencesSome Project TopicsQuivery Modification on XML DocumentsAccess control for web systemsIntrusion detection systemAccess control for multimedia systems -E.g., access control for image, videoRole-based access control systemAccess control for object systemsSecure data warehouseIndex to LecturesLecture 1: August 24, 2011; This lecture gives an introduction to data and applications securityLecture 2: August 29: Secure data storage and retrieval in a cloud (skip for exam 1)Lecture 3: Aug 31: Cyber SecurityLecture 4: Sept 7: Access control in data management systemsLecture 5: Sept 7: PoliciesLecture 6: Sept 12: Data mining for malware detectionLecture 7: Sept 14: Multilevel secure data managementLecture 8: Sept 14: Assignment #1Lecture 9: Sept 19: Completed lecture 7; started on Inference Problem – 1Lecture 10: Sept 21: Novel class detectionIndex to LecturesSept 26th Continuation of Inference problem (Lecture 9) Lecture 11: Sept 28: NIST NVD lecture was given that day; but lecture posted is Inference problem – II which was covered on Oct 3Lecture 12: Sept 28, Assignment #2Oct 3 lecture: Gave the lecture posted under Lecture 11 which is inference problem - IILecture 13: Oct 5: Secure Distributed Data Management (skip the part on single sign and identity mgmt on for exam #1)Lecture 14: Oct 10: Malware (pages 4-29 for exam #1)Lecture 15: This lecture was given on Sept 28; NIST NVD LectureLecture 16: Oct 10: Attacks to databasesOctober 12: Lecture 17: SQL InjectionIndex to Lectures for Exam 2 October 17: Lecture 18 Secure publishing of XML Data (1)October 19: Exam #1 (no lectures posted)October 24: Lecture 19: Trustworthy semantic web (2)October 26: Lecture 20 Introduction to semantic web (not included in exam)October 31: Lecture 21: Assignment #3November 2: Lecture 22: Secure web services and SOA (3)November 7: Lecture 23: Scalable access control (Dr. Cadenhead) – Optional – will not be included in examIndex to Lectures for Exam 2November 9: Lecture 24: Secure object systems (4)November


View Full Document

UTD CS 6V81 - CS 6V81 Introduction

Documents in this Course
Botnets

Botnets

33 pages

Privacy

Privacy

27 pages

Privacy

Privacy

27 pages

Load more
Download CS 6V81 Introduction
Our administrator received your request to download this document. We will send you the file to your email shortly.
Loading Unlocking...
Login

Join to view CS 6V81 Introduction and access 3M+ class-specific study document.

or
We will never post anything without your permission.
Don't have an account?
Sign Up

Join to view CS 6V81 Introduction 2 2 and access 3M+ class-specific study document.

or

By creating an account you agree to our Privacy Policy and Terms Of Use

Already a member?