This preview shows page 1 out of 4 pages.

Save
View full document
View full document
Premium Document
Do you want full access? Go Premium and unlock all 4 pages.
Access to all documents
Download any document
Ad free experience
Premium Document
Do you want full access? Go Premium and unlock all 4 pages.
Access to all documents
Download any document
Ad free experience

Unformatted text preview:

Data and Applications Security Developments and DirectionsProblem #1Problem #2Problem #3Data and Applications Security Developments and DirectionsDr. Bhavani ThuraisinghamThe University of Texas at DallasLecture #21Assignment #4: Secure Semantic Web, Secure Geospatial Data and Secure Knowledge managementMarch 19, 2008Problem #1Describe a application that requires the interoperability between multiple data sources (e.g., records in doctors’ office, hospitals, insurance companies). Develop security policies for interoperability. Show how semantic web technologies may be used to provide secure interoperability.Problem #2Describe a geospatial application (preferably in the crime domain or in the national security domain). Show how security policies may be applied to such a application? Is there a need for privacy?Problem #3Describe knowledge management for an application (e.g., a corporate environment). Discuss with examples, the need for secure knowledge management for your


View Full Document

UTD CS 6V81 - CS 6V81 ASSIGNMENT # 4

Documents in this Course
Botnets

Botnets

33 pages

Privacy

Privacy

27 pages

Privacy

Privacy

27 pages

Load more
Download CS 6V81 ASSIGNMENT # 4
Our administrator received your request to download this document. We will send you the file to your email shortly.
Loading Unlocking...
Login

Join to view CS 6V81 ASSIGNMENT # 4 and access 3M+ class-specific study document.

or
We will never post anything without your permission.
Don't have an account?
Sign Up

Join to view CS 6V81 ASSIGNMENT # 4 2 2 and access 3M+ class-specific study document.

or

By creating an account you agree to our Privacy Policy and Terms Of Use

Already a member?