Data and Applications Security Developments and Directions

Slides:



Advertisements
Similar presentations
Data and Applications Security Developments and Directions Dr. Bhavani Thuraisingham The University of Texas at Dallas Secure Knowledge Management: and.
Advertisements

Digital Forensics Dr. Bhavani Thuraisingham The University of Texas at Dallas Review for Final Exam November 19, 2010.
Data and Applications Security Developments and Directions Dr. Bhavani Thuraisingham The University of Texas at Dallas Introduction to the Course January.
Data and Applications Security Developments and Directions Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #1 Introduction to Data.
Digital Forensics Dr. Bhavani Thuraisingham The University of Texas at Dallas Introduction to the Course August 24, 2011.
Data Management Information Management Knowledge Management Data and Applications Security Challenges Bhavani Thuraisingham October 2006.
Data and Applications Security Developments and Directions Dr. Bhavani Thuraisingham The University of Texas at Dallas Introduction to the Course August.
Data and Applications Security Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #1 Introduction to Data and Applications Security August.
Data and Applications Security Developments and Directions Guest Lecture Dr. Kevin Hamlen Given in February 2012.
Secure Sensor Data/Information Management and Mining Bhavani Thuraisingham The University of Texas at Dallas October 2005.
Advanced Database Course (ESED5204) Eng. Hanan Alyazji University of Palestine Software Engineering Department.
Information Security Analytics Dr. Bhavani Thuraisingham The University of Texas at Dallas Introduction to the Course.
Trustworthy Semantic Web Dr. Bhavani Thuraisingham The University of Texas at Dallas Review for the Final Exam December 8, 2008.
Trustworthy Semantic Webs Dr. Bhavani Thuraisingham The University of Texas at Dallas Introduction to the Course.
Digital Forensics Dr. Bhavani Thuraisingham The University of Texas at Dallas Introduction to the Course August 20, 2007.
Data and Applications Security Developments and Directions Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #22 Secure Web Information.
Data and Applications Security Developments and Directions Dr. Bhavani Thuraisingham The University of Texas at Dallas Introduction to the Course January.
Digital Forensics Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #1 Introduction to Data and Applications Security and Digital Forensics.
Dr. Bhavani Thuraisingham January 14, 2011 Building Trustworthy Semantic Webs Lecture #1: Introduction to Trustworthy Semantic Web.
Trustworthy Semantic Web Dr. Bhavani Thuraisingham The University of Texas at Dallas Inference Problem March 4, 2011.
Introduction to Biometrics Dr. Bhavani Thuraisingham The University of Texas at Dallas Introduction to the Course August 22, 2005.
Information Security Analytics Dr. Bhavani Thuraisingham The University of Texas at Dallas Introduction to the Course.
Erik Jonsson School of Engineering and Computer Science The University of Texas at Dallas Cyber Security Research on Engineering Solutions Dr. Bhavani.
B. Prabhakaran1 Multimedia Systems Reference Text “Multimedia Database Management Systems” by B. Prabhakaran, Kluwer Academic Publishers. – Kluwer bought.
Data and Applications Security Developments and Directions Dr. Bhavani Thuraisingham The University of Texas at Dallas Introduction to the Course January.
Data and Applications Security
Data and Applications Security Developments and Directions
Prof. Bhavani Thuraisingham The University of Texas at Dallas
Data and Applications Security Developments and Directions
Building Trustworthy Semantic Webs
Digital Forensics Dr. Bhavani Thuraisingham
Lecture #11: Ontology Engineering Dr. Bhavani Thuraisingham
Data and Applications Security
Data and Applications Security Developments and Directions
Dr. Bhavani Thuraisingham The University of Texas at Dallas
Dr. Bhavani Thuraisingham The University of Texas at Dallas
Multimedia Systems Reference Text
Data and Applications Security Developments and Directions
Building Trustworthy Semantic Webs
Building Trustworthy Semantic Web
Data and Applications Security Developments and Directions
Data and Applications Security Developments and Directions
Data and Applications Security Developments and Directions
Trustworthy Semantic Webs
Data and Applications Security Developments and Directions
Data and Applications Security Developments and Directions
Data and Applications Security Developments and Directions
Data and Applications Security Developments and Directions
Data and Applications Security Developments and Directions
Data and Applications Security Developments and Directions
Data and Applications Security Developments and Directions
Data and Applications Security Developments and Directions
Data and Applications Security Developments and Directions
Data and Applications Security Developments and Directions
Data and Applications Security Developments and Directions
Data and Applications Security Developments and Directions
Building Trustworthy Semantic Web
Data and Applications Security Developments and Directions
Trustworthy Semantic Web
Data and Applications Security Developments and Directions
Data and Applications Security Developments and Directions
Data and Applications Security
Data and Applications Security Developments and Directions
Dr. Bhavani Thuraisingham The University of Texas at Dallas
Developing and Securing the Cloud
Data and Applications Security Developments and Directions
Data and Applications Security
Data and Applications Security
Digital Forensics Dr. Bhavani Thuraisingham
Presentation transcript:

Data and Applications Security Developments and Directions Dr. Bhavani Thuraisingham The University of Texas at Dallas Introduction to the Course January 14, 2011

Objective of the Unit This unit provides an overview of the course. The course describes concepts, developments, challenges, and directions in data and applications security. Topics include database security, distributed data management security, object security, data warehouse security, data mining for security applications, privacy, secure semantic web, secure digital libraries, secure knowledge management and secure sensor information management, biometrics

Outline of the Unit Outline of Course Course Work Course Rules Contact

Outline of the Course Unit #1: Introduction to Data and Applications Part I: Background Unit #2: Data Management Unit #3: Information Security Unit #4: Information Management Part II: Discretionary Security Unit #5: Concepts Unit #6: Policy Enforcement Part III: Mandatory Security Unit #7: Concepts Unit #8: Architectures

Outline of the Course (Continued) Part IV: Secure Relational Data Management Unit #9: Data Model Unit #10: Functions Unit #11: Prototypes and Products Part V: Inference Problem Unit #12: Concepts Unit #13: Constraint Processing Unit #14: Conceptual Structures Part VI: Secure Distributed Data Management Unit #15: Secure Distributed data management Unit #16: Secure Heterogeneous Data Integration Unit #17: Secure Federated Data Management

Outline of the Course (Continued) Part VII: Secure Object Data Management Unit #18: Secure Object Management Unit #19: Secure Distributed Objects and Modeling Applications Unit #20: Secure Multimedia Systems Part VIII: Data Warehousing, Data Mining and Security Unit #21: Secure Data Warehousing Unit #22: Data Mining for Security Applications Unit #23: Privacy Part IX: Secure Information Management Unit #24: Secure Digital Libraries Unit #25: Secure Semantic Web (web services, XML security) Unit #26: Secure Information and Knowledge Management

Outline of the Course (Continued) Part X: Emerging Technologies Unit #27: Secure Dependable Data Management Unit #28: Secure Sensor and Wireless Data Management Unit #29: Other Emerging Technologies Unit #30 Conclusion to the Course Guest Lectures Some guest lectures may be included Some other topics Review for finals

Course Work 2 Exams: 20 points each Programming Project and demonstration, 16 points Term Paper and presentation: 12 points 4 Homework assignments: 8 points each

Some Topics for Papers XML Security Inference Problem Privacy Secure Biometrics Intrusion Detection E-Commerce Security Secure Sensor Information Management Secure Distributed Systems Secure Semantic Web Secure Data Warehousing Insider Threat Analysis Secure Multimedia Systems

Term Papers: Example Format Abstract Introduction Background on the Topic Survey of various techniques, designs etc, Analyze the techniques, designs etc. and give your opinions Directions for further work Summary and Conclusions References

Term Papers: Example Format - II Abstract Introduction Background on the Topic and Related Work Discuss strengths and weaknesses of your work and others’ work Give your own design Directions for further work Summary and Conclusions References

Project Report Format Overview of the Project Design of the System Input/Output Future Enhancements References

Some Project Topics Quivery Modification on XML Documents Access control for web systems Intrusion detection system Access control for multimedia systems E.g., access control for image, video Role-based access control system Access control for object systems Secure data warehouse

Course Rules Course attendance is mandatory; unless permission is obtained from instructor for missing a class with a valid reason (documentation needed for medical emergency for student or a close family member – e.g., spouse, parent, child). Attendance will be collected every lecture. 5 points will be deducted out of 100 for each lecture missed without approval. Each student will work individually Late assignments will not be accepted. All assignments have to be turned in just after the lecture on the due date No make up exams unless student can produce a medical certificate or give evidence of close family emergency Copying material from other sources will not be permitted unless the source is properly referenced Any student who plagiarizes from other sources will be reported to the appropriate UTD authroities

Contact For more information please contact Dr. Bhavani Thuraisingham Professor of Computer Science and Director of Cyber Security Research Center Erik Jonsson School of Engineering and Computer Science EC31, The University of Texas at Dallas Richardson, TX 75080 Phone: 972-883-4738 Fax: 972-883-2399 Email: bhavani.thuraisingham@utdallas.edu URL:http://www.utdallas.edu/~bxt043000/