Data and Applications Security Developments and DirectionsObjective of the UnitOutline of the UnitOutline of the CourseOutline of the Course (Continued)Slide 6Slide 7Course WorkSome Topics for PapersTerm Papers: Example FormatTerm Papers: Example Format - IIProject Report FormatSome Project TopicsCourse RulesContactDue Dates of Assignments/Term papers, etc. September 2, 2009, Updated Oct 7, October 19New Policy: Effective October 7, 2009Papers to Read for Mid-term examPapers to Read for Exam #2Data and Applications Security Developments and DirectionsDr. Bhavani ThuraisinghamThe University of Texas at DallasIntroduction to the CourseAugust 24, 2009Objective of the UnitThis unit provides an overview of the course. The course describes concepts, developments, challenges, and directions in data and applications security. Topics include -database security, distributed data management security, object security, data warehouse security, data mining for security applications, privacy, secure semantic web, secure digital libraries, secure knowledge management and secure sensor information management, biometricsOutline of the UnitOutline of CourseCourse WorkCourse RulesContactAppendixOutline of the CourseUnit #1: Introduction to Data and Applications Part I: Background-Unit #2: Data Management-Unit #3: Information Security-Unit #4: Information Management Part II: Discretionary Security-Unit #5: Concepts-Unit #6: Policy EnforcementPart III: Mandatory Security-Unit #7: Concepts-Unit #8: ArchitecturesOutline of the Course (Continued)Part IV: Secure Relational Data Management-Unit #9: Data Model-Unit #10: Functions-Unit #11: Prototypes and ProductsPart V: Inference Problem-Unit #12: Concepts-Unit #13: Constraint Processing-Unit #14: Conceptual StructuresPart VI: Secure Distributed Data Management-Unit #15: Secure Distributed data management-Unit #16: Secure Heterogeneous Data Integration-Unit #17: Secure Federated Data ManagementOutline of the Course (Continued)Part VII: Secure Object Data Management-Unit #18: Secure Object Management-Unit #19: Secure Distributed Objects and Modeling Applications-Unit #20: Secure Multimedia SystemsMIDTERMPart VIII: Data Warehousing, Data Mining and Security (Oct 19-Oct 26)-Unit #21: Secure Data Warehousing-Unit #22: Data Mining for Security Applications-Unit #23: PrivacyPart IX: Secure Information Management-Unit #24: Secure Digital Libraries (Nov 9, 11)-Unit #25: Secure Semantic Web (web services, XML security) (Oct 28, Nov 2, Nov 4)-Unit #26: Secure Information and Knowledge ManagementOutline of the Course (Continued)Part X: Emerging Technologies -Unit #27: Secure Dependable Data Management (Nov 16)-Unit #28: Secure Sensor and Wireless Data Management -Unit #29: Other Emerging Technologies (Nov 18)-Extra Topics (Nov 23, 25)Social networkUnit #30 Conclusion to the CourseGuest Lectures Some guest lectures may be included Some other topics (Nov 30)Review for finals (Dec 2)Course WorkThree term papers; each worth 9 pointsTwo exams each worth 15 points-Mid-term and Final examsProgramming project worth 15 points-Due day; the day of the final examFour homework assignments each worth 7 points -Due dates: will be announcedTotal 100 pointsCourse Book: Database and Applications Security: Integration Data Management and Information Security, Bhavani Thuraisingham, CRC Press, 2005Will also include papers as reading materialSome Topics for PapersXML SecurityInference ProblemPrivacySecure BiometricsIntrusion DetectionE-Commerce SecuritySecure Sensor Information ManagementSecure Distributed SystemsSecure Semantic WebSecure Data WarehousingInsider Threat AnalysisSecure Multimedia SystemsTerm Papers: Example FormatAbstractIntroductionBackground on the TopicSurvey of various techniques, designs etc,Analyze the techniques, designs etc. and give your opinionsDirections for further workSummary and ConclusionsReferencesTerm Papers: Example Format - IIAbstractIntroductionBackground on the Topic and Related WorkDiscuss strengths and weaknesses of your work and others’ workGive your own designDirections for further workSummary and ConclusionsReferencesProject Report FormatOverview of the ProjectDesign of the SystemInput/Output Future EnhancementsReferencesSome Project TopicsQuivery Modification on XML DocumentsAccess control for web systemsIntrusion detection systemAccess control for multimedia systems -E.g., access control for image, videoRole-based access control systemAccess control for object systemsSecure data warehouseCourse RulesUnless special permission is obtained from the instructor, each student will work individuallyLate assignments will not be accepted. All assignments have to be turned in just after the lecture on the due dateNo make up exams unless student can produce a medical certificate or give evidence of close family emergencyCopying material from other sources will not be permitted unless the source is properly referencedAny student who plagiarizes from other sources will be reported to the Computer Science department and any other committees as advices by the departmentStudents must attend every class. If a student is unable to attend, approval from the instructor is needed unless it is an emergency. If this is no followed, a student can either be dismissed from class or points deducted from the scores. Exact policy will be announced by August 31 in classContactFor more information please contact-Dr. Bhavani Thuraisingham-Professor of Computer Science and-Director of Cyber Security Research Center Erik Jonsson School of Engineering and Computer Science EC31, The University of Texas at Dallas Richardson, TX 75080-Phone: 972-883-4738-Fax: 972-883-2399-Email: [email protected]:http://www.utdallas.edu/~bxt043000/Due Dates of Assignments/Term papers, etc.September 2, 2009, Updated Oct 7, October 19Assignment #1: September 14, 2009Term Paper #1: September 21, 2009Assignment #2 will be given on September 14, 2009 and due date is September 28, 2009-Assignment #2 was given on Sept 30th and due date is October 12thMid-term exam – either October 5 or October 14-Exam is October 14Term Paper #2 is due: Due November 2, Due November 9thTerm Paper #3: November 25Assignment #3: Given Oct 12th ,
View Full Document