Presentation is loading. Please wait.

Presentation is loading. Please wait.

Data and Applications Security Developments and Directions

Similar presentations


Presentation on theme: "Data and Applications Security Developments and Directions"— Presentation transcript:

1 Data and Applications Security Developments and Directions
Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #6 Assignment #1 on Access Control and Policies January 28, 2011

2 References Lecture Notes Text Book for Class Additional Papers
RBAC: Ravi S. Sandhu, Edward J. Coyne, Hal L. Feinstein, Charles E. Youman: Role-Based Access Control Models. IEEE Computer 29(2): (1996) UCON: Jaehong Park, Ravi S. Sandhu: The UCONABC usage control model. ACM Trans. Inf. Syst. Secur. 7(1): (2004) park.pdf?key1=507722&key2= &coll=ACM&dl= ACM&CFID= &CFTOKEN= DCON: Roshan K. Thomas, Ravi S. Sandhu: Towards a Multi-dimensional Characterization of Dissemination Control. POLICY 2004: (IEEE)

3 Problem #1 Consider an example application (e.g., from healthcare, defense, financial) Specify some meaningful policies for this application that address confidentiality, privacy and trust

4 Problem #2 Consider an example application where there is a need for organizations to share data Example: Defense: Army, Navy, Air Force Healthcare: Doctor, Hospital, Insurance company Give meaningful security policies illustrating the need for organizations share data and yet having to enforce the policies Policies may include confidentiality, privacy and trust

5 Problem #3 Read the papers on RBAC, UCON and DCON listed in this unit
For an example application (or applications) specify policies for RBAC, UCON and DCON


Download ppt "Data and Applications Security Developments and Directions"

Similar presentations


Ads by Google