Presentation is loading. Please wait.

Presentation is loading. Please wait.

INFSCI 2935: Introduction to Computer Security1 Project Implementation Implementation  Reasonable sophistication  Up to 3 people maximum Survey type.

Similar presentations


Presentation on theme: "INFSCI 2935: Introduction to Computer Security1 Project Implementation Implementation  Reasonable sophistication  Up to 3 people maximum Survey type."— Presentation transcript:

1 INFSCI 2935: Introduction to Computer Security1 Project Implementation Implementation  Reasonable sophistication  Up to 3 people maximum Survey type paper Survey type paper  Comparative/tradeoff studies  Current trends, challenges, possible approaches  One person!  Number of references should be adequate (depends on area)  No introductory stuff! New idea/research ?? New idea/research ?? Others: Case studies?? Others: Case studies??

2 INFSCI 2935: Introduction to Computer Security2 Project Topics (not limited to these only!)  XML security  Implementation of Access Control and Authentication  Cryptographic protocols  Database security  Ad hoc network security  Cyber Security  Privacy  Web service security / Java security  Intrusion detection  Auditing Systems  Security and ethics/Usability/Economics  Smartcards and standards for smartcards  E-commerce security (secure transaction)  Multimedia security  Security in wireless/mobile environments  Case studies from a specific domain Opportunity with the CSSD Software metrics Semantic Event Manager Mapping wireless access points in University (State of secuirty)

3 INFSCI 2935: Introduction to Computer Security3 Project Schedule Proposal (by Nov 18) Proposal (by Nov 18)  Up to 2 pages (identify a group)  State the goals  State the significance Final project report Final project report  By the last day of the semester  Article format, or conference format Each person should state his contribution  Implementation projects should demonstrate to TA and/or me


Download ppt "INFSCI 2935: Introduction to Computer Security1 Project Implementation Implementation  Reasonable sophistication  Up to 3 people maximum Survey type."

Similar presentations


Ads by Google