This preview shows page 1-2 out of 5 pages.

Save
View full document
View full document
Premium Document
Do you want full access? Go Premium and unlock all 5 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 5 pages.
Access to all documents
Download any document
Ad free experience
Premium Document
Do you want full access? Go Premium and unlock all 5 pages.
Access to all documents
Download any document
Ad free experience

Unformatted text preview:

Data and Applications Security Developments and DirectionsReferencesProblem #1Problem #2Problem #3Data and Applications Security Developments and DirectionsDr. Bhavani ThuraisinghamThe University of Texas at DallasAssignment #1 on Access Control and PoliciesSeptember 14, 2011Due Date: September 28, 2011ReferencesLecture NotesText Book for ClassAdditional Papers-RBAC: Ravi S. Sandhu, Edward J. Coyne, Hal L. Feinstein, Charles E. Youman: Role-Based Access Control Models. IEEE Computer 29(2): 38-47 (1996) -UCON: Jaehong Park, Ravi S. Sandhu: The UCONABC usage control model. ACM Trans. Inf. Syst. Secur. 7(1): 128-174 (2004) -http://delivery.acm.org/10.1145/510000/507722/p57-park.pdf?key1=507722&key2=2341065321&coll=ACM&dl=ACM&CFID=23616711&CFTOKEN=10325487-DCON: Roshan K. Thomas, Ravi S. Sandhu: Towards a Multi-dimensional Characterization of Dissemination Control. POLICY 2004: 197-200 (IEEE)Problem #1Consider an example application (e.g., from healthcare, defense, financial)Specify some meaningful policies for this application that address confidentiality, privacy and trustProblem #2Consider an example application where there is a need for organizations to share data-Example: Defense: Army, Navy, Air Force-Healthcare: Doctor, Hospital, Insurance companyGive meaningful security policies illustrating the need for organizations share data and yet having to enforce the policies-Policies may include confidentiality, privacy and trustProblem #3Read the papers on RBAC, UCON and DCON listed in this unitFor an example application (or applications) specify policies for RBAC, UCON and


View Full Document

UTD CS 6V81 - CS 6V81 ASSIGNMENT # 1

Documents in this Course
Botnets

Botnets

33 pages

Privacy

Privacy

27 pages

Privacy

Privacy

27 pages

Load more
Download CS 6V81 ASSIGNMENT # 1
Our administrator received your request to download this document. We will send you the file to your email shortly.
Loading Unlocking...
Login

Join to view CS 6V81 ASSIGNMENT # 1 and access 3M+ class-specific study document.

or
We will never post anything without your permission.
Don't have an account?
Sign Up

Join to view CS 6V81 ASSIGNMENT # 1 2 2 and access 3M+ class-specific study document.

or

By creating an account you agree to our Privacy Policy and Terms Of Use

Already a member?