This preview shows page 1 out of 3 pages.

Save
View full document
View full document
Premium Document
Do you want full access? Go Premium and unlock all 3 pages.
Access to all documents
Download any document
Ad free experience
Premium Document
Do you want full access? Go Premium and unlock all 3 pages.
Access to all documents
Download any document
Ad free experience

Unformatted text preview:

Data and Applications Security Developments and DirectionsProblem #1Problem #2Data and Applications Security Developments and DirectionsDr. Bhavani ThuraisinghamThe University of Texas at DallasLecture #9Assignment #2: Inference and Privacy problemsFebruary 6, 2008Problem #1(i) Select either a military or healthcare application and specify various policies (i.e. security or privacy constraints) to illustrate the inference or privacy problems(ii) Show how a system may process the policies (i.e. constraints) in Part (i) during query, update and database design operation.Problem #2(i) Describe a military and healthcare example with policies (security or privacy) and show how conceptual structures/models may be used to represent the applications(ii) Show how a system could reason with the policies and the conceptual structures of (i) to determine security or privacy violations through


View Full Document

UTD CS 6V81 - CS 6V81 ASSIGNMENT # 2

Documents in this Course
Botnets

Botnets

33 pages

Privacy

Privacy

27 pages

Privacy

Privacy

27 pages

Load more
Download CS 6V81 ASSIGNMENT # 2
Our administrator received your request to download this document. We will send you the file to your email shortly.
Loading Unlocking...
Login

Join to view CS 6V81 ASSIGNMENT # 2 and access 3M+ class-specific study document.

or
We will never post anything without your permission.
Don't have an account?
Sign Up

Join to view CS 6V81 ASSIGNMENT # 2 2 2 and access 3M+ class-specific study document.

or

By creating an account you agree to our Privacy Policy and Terms Of Use

Already a member?