Data and Applications Security Developments and Directions Dr. Bhavani Thuraisingham The University of Texas at Dallas Introduction to the Course January 8, 2006
Objective of the Unit This unit provides an overview of the course. The course describes concepts, developments, challenges, and directions in data and applications security. Topics include database security, distributed data management security, object security, data warehouse security, data mining for security applications, privacy, secure semantic web, secure digital libraries, secure knowledge management and secure sensor information management, biometrics
Outline of the Unit Outline of Course Course Work Course Rules Contact Appendix
Outline of the Course Unit #1: Introduction to Data and Applications Part I: Background Unit #2: Data Management Unit #3: Information Security Unit #4: Information Management Part II: Discretionary Security Unit #5: Concepts Unit #6: Policy Enforcement Part III: Mandatory Security Unit #7: Concepts Unit #8: Architectures
Outline of the Course (Continued) Part IV: Secure Relational Data Management Unit #9: Data Model Unit #10: Functions Unit #11: Prototypes and Products Part V: Inference Problem Unit #12: Concepts Unit #13: Constraint Processing Unit #14: Conceptual Structures Part VI: Secure Distributed Data Management Unit #15: Secure Distributed data management Unit #16: Secure Heterogeneous Data Integration Unit #17: Secure Federated Data Management
Outline of the Course (Continued) Part VII: Secure Object Data Management Unit #18: Secure Object Management Unit #19: Secure Distributed Objects and Modeling Applications Unit #20: Secure Multimedia Systems Part VIII: Data Warehousing, Data Mining and Security Unit #21: Secure Data Warehousing Unit #22: Data Mining for Security Applications Unit #23: Privacy Part IX: Secure Information Management Unit #24: Secure Digital Libraries Unit #25: Secure Semantic Web Unit #26: Secure Information and Knowledge Management
Outline of the Course (Continued) Part X: Emerging Technologies Unit #27: Secure Dependable Data Management Unit #28: Secure Sensor and Wireless Data Management Unit #29: Other Emerging Technologies Digital Forensics, Biometrics etc. Unit #30 Conclusion to the Course Guest Lectures
Course Work Two exams each worth 20 points Mid-term and Final exams Programming project worth 20 points Due date; the day of the final exam Four homework assignments worth 10 points each Due dates will be announced Total 100 points Course Book: Database and Applications Security: Integration Data Management and Information Security, Bhavani Thuraisingham, CRC Press, 2005 Term Paper (Optional for extra credit – 10 points)
Project Report Format Overview of the Project Design of the System Input/Output Future Enhancements References
Some Project Topics Query Modification on XML Documents Access control for web systems Intrusion detection system Access control for multimedia systems E.g., access control for image, video Role-based access control system Access control for object systems Secure data warehouse
Course Rules Unless special permission is obtained from the instructor, each student will work incidviaully Copying material from other sources will not be permitted unless the source is properly referenced Any student who plagiarizes from other sources will be reported to the Computer Science department and any other committees as advices by the department
Contact For more information please contact Dr. Bhavani Thuraisingham Professor of Computer Science and Director of Cyber Security Research Center Erik Jonsson School of Engineering and Computer Science EC31, The University of Texas at Dallas Richardson, TX 75080 Phone: 972-883-4738 Fax: 972-883-2399 Email: bhavani.thuraisingham@utdallas.edu http://www.utdallas.edu/~bxt043000/