Data and Applications Security Developments and DirectionsObjective of the UnitOutline of the UnitOutline of the CourseOutline of the Course (Continued)Slide 6Slide 7Course WorkCourse RulesContactAppendix 1 (1/27/04)Term Papers: Example FormatTerm Papers: Example Format - IISome Topics for PapersProject Report FormatProject Report Format - IISome Project TopicsLecture Topics (January 11-March 17, 2005 – I)Lecture Topics: (January 11, 2005 – March 17, 2005 – II)Lecture Topics: March 22, 2005 – April 21, 2005Data and Applications Security Developments and DirectionsDr. Bhavani ThuraisinghamThe University of Texas at DallasIntroduction to the CourseJanuary 11, 2005Objective of the UnitThis unit provides an overview of the course. The course describes concepts, developments, challenges, and directions in data and applications security. Topics include -database security, distributed data management security, object security, data warehouse security, data mining for security applications, privacy, secure semantic web, secure digital libraries, secure knowledge management and secure sensor information management.Outline of the UnitOutline of CourseCourse WorkCourse RulesContactAppendixOutline of the CourseUnit #1: Introduction to Data and Applications Part I: Background-Unit #2: Data Management-Unit #3: Information Security-Unit #4: Information Management Part II: Discretionary Security-Unit #5: Concepts-Unit #6: Policy EnforcementPart III: Mandatory Security-Unit #7: Concepts-Unit #8: ArchitecturesOutline of the Course (Continued)Part IV: Secure Relational Data Management-Unit #9: Data Model-Unit #10: Functions-Unit #11: Prototypes and ProductsPart V: Inference Problem-Unit #12: Concepts-Unit #13: Constraint Processing-Unit #14: Conceptual StructuresPart VI: Secure Distributed Data Management-Unit #15: Secure Distributed Databases -Unit #16: Secure Heterogeneous Database Integration-Unit #17: Secure Federated Database ManagementOutline of the Course (Continued)Part VII: Secure Object Data Management-Unit #18: Secure Object Data Management-Unit #19: Secure Distributed Objects and Modeling Applications-Unit #20: Secure Multimedia Data SystemsPart VIII: Data Warehousing, Data Mining and Security-Unit #21: Secure Data Warehousing-Unit #22: Data Mining for Security Applications-Unit #23: PrivacyPart IX: Secure Information Management-Unit #24: Secure Digital Libraries-Unit #25: Secure Semantic Web-Unit #26: Secure Information and Knowledge ManagementOutline of the Course (Continued)Part X: Emerging Technologies-Unit #27: Secure Dependable Data Management-Unit #28: Secure Sensor and Wireless Data Management-Unit #29: Other Emerging TechnologiesUnit #30 Conclusion to the CourseCourse WorkTwo term papers; each worth 15 points-Dates: One week before mid-term and one week before finalTwo exams each worth 20 points-Mid-term and Final examsProgramming project of your choice related to the course worth 30 points-Due day; the day of the final examTotal 100 pointsCourse Book: Database and Applications Security: Integration Data Management and Info0rmation Security, Bhavani Thuraisingham, CRC Press, 2005 (pre-publication version will be used)Course RulesUnless special permission is obtained from the instructor, each student will work incidviaullyCopying material from other sources will not be permitted unless the source is properly referencedAny student who plagiarizes from other sources will be reported to the Computer Science department and any other committees as advices by the departmentContactFor more information please contact-Dr. Bhavani Thuraisingham-Professor of Computer Science and-Director of Cyber Security Research Center Erik Jonsson School of Engineering and Computer Science EC31, The University of Texas at Dallas Richardson, TX 75080-Phone: 972-883-4738-Fax: 972-883-2399-Email: [email protected]:-http://www.cs.utdallas.edu/people/thuraisingham.htmlAppendix 1 (1/27/04)Mid-Term Exam -Tuesday March 1, 2005Final Exam-Thursday April 28, 2005 (Tentative)Term Paper I due: Thursday February 24, 2005Term Paper 2 due: Thursday April 21, 2005Programming project due: Thursday April 28, 2005If you need some inputs on your planned project or paper, please write an abstract and see me during the office hourTerm Papers: Example FormatAbstractIntroductionBackground on the TopicSurvey of various techniques, designs etc,Analyze the techniques, designs etc. and give your opinionsDirections for further workSummary and ConclusionsReferencesTerm Papers: Example Format - IIAbstractIntroductionBackground on the Topic and Related WorkGive your own designDiscuss strengths and weaknesses of your work and others’ workDirections for further workSummary and ConclusionsReferencesSome Topics for PapersXML SecurityInference ProblemPrivacySecure BiometricsIntrusion DetectionE-Commerce SecuritySecure Sensor Information ManagementSecure Distributed SystemsSecure Semantic WebSecure Data WarehousingInsider Threat AnalysisSecure Multimedia SystemsProject Report FormatOverview of the ProjectDesign of the SystemInputs/Outputs ExamplesAnalysisFuture EnhancementsReferencesAppendix A – Sample runsAppendix B – Source codeProject Report Format - IIOverview of the ProjectAlgorithms to be SimulatedSimulation ExperimentsInput/Output ExamplesAnalysisFuture EnhancementsReferencesAppendix A – Sample runsAppendix B – Source CodeSome Project TopicsQuery Modification on XML DocumentsAccess control for web systemsIntrusion detection systemAccess control for multimedia systems -E.g., access control for image, videoRole-based access control systemAccess control for object systemsSecure data warehouseLecture Topics (January 11-March 17, 2005 – I)January 11, 2005: Introduction to the course; Introduction to Data and applications securityJanuary 13, 2005: Data ManagementJanuary 18, 2005: Information Management and Computer SecurityJanuary 20, 2005: Access ControlJanuary 25, 2005: Multilevel Secure Database SystemsJanuary 27, 2005: Multilevel Secure Database Systems - IIFebruary 1, 2005: Guest Lecture: XML SecurityFebruary 3, 2005: Inference problem - IFebruary 8, 2005: Inference problem - IIFebruary 10, 2005: Secure
View Full Document