Each student should pick a paper from the available list given below. You are expected to give a critical presentation of the paper (don’t just repeat what the authors say, think about what they are saying and what they are possibly missing). Your presentation should be for 60 minutes including questions and discussion time. You are expected to prepare PowerPoint or similar slides. All students are expected to read all the papers picked for presentations (not just the paper they are presenting).
This is an individual assignment. You are required to complete it on your own without assistance of anyone. You are welcome to browse and read supplemental literature as appropriate. The slides must be your own.
The papers are available in the ACM Digital Library accessible through GMU.
Pick a paper, pick a presentation slot and I will accommodate requests first-come-first-serve. Send email to firstname.lastname@example.org with preference for paper and presentation slot. Please check availability on this web page. This page will be updated as needed until all presentations are assigned.
OPTION: Pick a paper of your choice from outside this list. It must of comparable depth and size as the ones listed here.
· Jean Bacon, Ken Moody, Walt Yao, ``A model of OASIS role-based access control and its support for active security,” ACM Trans. on Information and System Security, Vol. 5, No. 4, Nov. 2002, pages 492-540.
· Sushil Jajodia, Pierangela Samarati, Maria Luisa Sapino, V. S. Subrahmanian, ``Flexible support for multiple access control policies,'' ACM Trans. on Database Systems, Vol. 26, No. 2, June 2001, pages 214-260.
· Michael M. Swift, Anne Hopkins, Peter Brundrett, Cliff Van Dyke, Praerit Garg, Shannon Chan, Mario Goertzel, Gregory Jensenworth, ``Improving the granularity of access control for Windows 2000,” ACM Trans. on Information and System Security, Vol. 5, No. 4, Nov. 2002, pages 398-437.
· Fred B. Schneider, ``Enforceable security policies,” ACM Trans. on Information and System Security, Vol. 3, No. 1, Nov. 2000, pages 30-50.
· P. Ning, Y. Cui, D. S. Reeves, and D. Xu, ``Techniques and Tools for Analyzing Intrusion Alerts’’, ACM Transactions on Information and Systems Security, vol.7, no. 2, pp. 274-318, May 2004.
· Steve Barker, Peter J. Stuckey, ``Flexible access control policy specification with constraint logic programming,” ACM Trans. on Information and System Security, Vol. 6, No. 4, Nov. 2003, pages 501-546.
· Papers to be announced