Download presentation
Presentation is loading. Please wait.
Published byวีระชาย สมิธ Modified over 5 years ago
1
Data and Applications Security Developments and Directions
Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #6 Assignment #1 on Access Control and Policies January 28, 2011
2
References Lecture Notes Text Book for Class Additional Papers
RBAC: Ravi S. Sandhu, Edward J. Coyne, Hal L. Feinstein, Charles E. Youman: Role-Based Access Control Models. IEEE Computer 29(2): (1996) UCON: Jaehong Park, Ravi S. Sandhu: The UCONABC usage control model. ACM Trans. Inf. Syst. Secur. 7(1): (2004) park.pdf?key1=507722&key2= &coll=ACM&dl= ACM&CFID= &CFTOKEN= DCON: Roshan K. Thomas, Ravi S. Sandhu: Towards a Multi-dimensional Characterization of Dissemination Control. POLICY 2004: (IEEE)
3
Problem #1 Consider an example application (e.g., from healthcare, defense, financial) Specify some meaningful policies for this application that address confidentiality, privacy and trust
4
Problem #2 Consider an example application where there is a need for organizations to share data Example: Defense: Army, Navy, Air Force Healthcare: Doctor, Hospital, Insurance company Give meaningful security policies illustrating the need for organizations share data and yet having to enforce the policies Policies may include confidentiality, privacy and trust
5
Problem #3 Read the papers on RBAC, UCON and DCON listed in this unit
For an example application (or applications) specify policies for RBAC, UCON and DCON
Similar presentations
© 2024 SlidePlayer.com. Inc.
All rights reserved.