This preview shows page 1-2-3-4-5 out of 16 pages.

Save
View full document
View full document
Premium Document
Do you want full access? Go Premium and unlock all 16 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 16 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 16 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 16 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 16 pages.
Access to all documents
Download any document
Ad free experience
Premium Document
Do you want full access? Go Premium and unlock all 16 pages.
Access to all documents
Download any document
Ad free experience

Unformatted text preview:

Data and Applications Security Developments and DirectionsObjective of the UnitOutline of the UnitOutline of the CourseOutline of the Course (Continued)Slide 6Slide 7Course WorkDue DatesSome Topics for PapersTerm Papers: Example FormatTerm Papers: Example Format - IIProject Report FormatSome Project TopicsCourse RulesContactData and Applications Security Developments and DirectionsDr. Bhavani ThuraisinghamThe University of Texas at DallasIntroduction to the CourseJanuary 7, 2008Objective of the UnitThis unit provides an overview of the course. The course describes concepts, developments, challenges, and directions in data and applications security. Topics include -database security, distributed data management security, object security, data warehouse security, data mining for security applications, privacy, secure semantic web, secure digital libraries, secure knowledge management and secure sensor information management, biometricsOutline of the UnitOutline of CourseCourse WorkCourse RulesContactAppendixOutline of the CourseUnit #1: Introduction to Data and Applications Part I: Background-Unit #2: Data Management-Unit #3: Information Security-Unit #4: Information Management Part II: Discretionary Security-Unit #5: Concepts-Unit #6: Policy EnforcementPart III: Mandatory Security-Unit #7: Concepts-Unit #8: ArchitecturesOutline of the Course (Continued)Part IV: Secure Relational Data Management-Unit #9: Data Model-Unit #10: Functions-Unit #11: Prototypes and ProductsPart V: Inference Problem-Unit #12: Concepts-Unit #13: Constraint Processing-Unit #14: Conceptual StructuresPart VI: Secure Distributed Data Management-Unit #15: Secure Distributed data management-Unit #16: Secure Heterogeneous Data Integration-Unit #17: Secure Federated Data ManagementOutline of the Course (Continued)Part VII: Secure Object Data Management-Unit #18: Secure Object Management-Unit #19: Secure Distributed Objects and Modeling Applications-Unit #20: Secure Multimedia SystemsPart VIII: Data Warehousing, Data Mining and Security-Unit #21: Secure Data Warehousing-Unit #22: Data Mining for Security Applications-Unit #23: PrivacyPart IX: Secure Information Management-Unit #24: Secure Digital Libraries-Unit #25: Secure Semantic Web-Unit #26: Secure Information and Knowledge ManagementOutline of the Course (Continued)Part X: Emerging Technologies-Unit #27: Secure Dependable Data Management-Unit #28: Secure Sensor and Wireless Data Management-Unit #29: Other Emerging TechnologiesDigital Forensics, Biometrics etc. Unit #30 Conclusion to the CourseGuest LecturesCourse WorkThree term papers; each worth 9 points-Dates: One week before mid-term and one week before finalTwo exams each worth 15 points-Mid-term and Final examsProgramming project worth 15 points-Due day; the day of the final examFour homework assignments each worth 7 points -Due dates: will be announcedTotal 100 pointsCourse Book: Database and Applications Security: Integration Data Management and Information Security, Bhavani Thuraisingham, CRC Press, 2005Due DatesAssignment 1: February 6. 2008Assignment 2: February 20, 2008Assignment 3: March 26, 2008Assignment 4: April 9, 2008Term paper 1: March 19, 2008Term Paper 2: April 2, 2008Term Paper 3: April 16, 2008Mid-term: February 27, 2008Final exam: May 7, 2008Programming project: May 7, 2008Some Topics for PapersXML SecurityInference ProblemPrivacySecure BiometricsIntrusion DetectionE-Commerce SecuritySecure Sensor Information ManagementSecure Distributed SystemsSecure Semantic WebSecure Data WarehousingInsider Threat AnalysisSecure Multimedia SystemsTerm Papers: Example FormatAbstractIntroductionBackground on the TopicSurvey of various techniques, designs etc,Analyze the techniques, designs etc. and give your opinionsDirections for further workSummary and ConclusionsReferencesTerm Papers: Example Format - IIAbstractIntroductionBackground on the Topic and Related WorkGive your own designDiscuss strengths and weaknesses of your work and others’ workDirections for further workSummary and ConclusionsReferencesProject Report FormatOverview of the ProjectDesign of the SystemInput/Output Future EnhancementsReferencesSome Project TopicsQuivery Modification on XML DocumentsAccess control for web systemsIntrusion detection systemAccess control for multimedia systems -E.g., access control for image, videoRole-based access control systemAccess control for object systemsSecure data warehouseCourse RulesUnless special permission is obtained from the instructor, each student will work incidviaullyCopying material from other sources will not be permitted unless the source is properly referencedAny student who plagiarizes from other sources will be reported to the Computer Science department and any other committees as advices by the departmentContactFor more information please contact-Dr. Bhavani Thuraisingham-Professor of Computer Science and-Director of Cyber Security Research Center Erik Jonsson School of Engineering and Computer Science EC31, The University of Texas at Dallas Richardson, TX 75080-Phone: 972-883-4738-Fax: 972-883-2399-Email:


View Full Document

UTD CS 6V81 - CS 6V81 Introduction

Documents in this Course
Botnets

Botnets

33 pages

Privacy

Privacy

27 pages

Privacy

Privacy

27 pages

Load more
Download CS 6V81 Introduction
Our administrator received your request to download this document. We will send you the file to your email shortly.
Loading Unlocking...
Login

Join to view CS 6V81 Introduction and access 3M+ class-specific study document.

or
We will never post anything without your permission.
Don't have an account?
Sign Up

Join to view CS 6V81 Introduction 2 2 and access 3M+ class-specific study document.

or

By creating an account you agree to our Privacy Policy and Terms Of Use

Already a member?