Papers and Guidelines for Student Presentations

Guidelines

Each student should pick a paper from the available list given below.  You are expected to give a critical presentation of the paper (don’t just repeat what the authors say, think about what they are saying and what they are possibly missing).  Your presentation should be for 60 minutes including questions and discussion time.  You are expected to prepare PowerPoint or similar slides.  All students are expected to read all the papers picked for presentations (not just the paper they are presenting).

This is an individual assignment.  You are required to complete it on your own without assistance of anyone.  You are welcome to browse and read supplemental literature as appropriate.  The slides must be your own.

The papers are available in the ACM Digital Library accessible through GMU.

 

Pick a paper, pick a presentation slot and I will accommodate requests first-come-first-serve.  Send email to sandhu@gmu.edu with preference for paper and presentation slot.  Please check availability on this web page.  This page will be updated as needed until all presentations are assigned.

OPTION: Pick a paper of your choice from outside this list.  It must of comparable depth and size as the ones listed here.

Presentations

  1. Presentation 1, 4/14/05 1st half: Richard Murphy

·        Jean Bacon, Ken Moody, Walt Yao, ``A model of OASIS role-based access control and its support for active security,”  ACM Trans. on Information and System Security, Vol. 5, No. 4, Nov. 2002, pages 492-540.

  1. Presentation 4, 4/14/05 2nd half: Rick Knowles

·        Sushil Jajodia, Pierangela Samarati, Maria Luisa Sapino, V. S. Subrahmanian, ``Flexible support for multiple access control policies,'' ACM Trans. on Database Systems, Vol. 26, No. 2, June 2001, pages 214-260.

  1. Presentation 3, 4/21/05 1st half: Mohamed K Kamara

·        Michael M. Swift, Anne Hopkins, Peter Brundrett, Cliff Van Dyke, Praerit Garg, Shannon Chan, Mario Goertzel, Gregory Jensenworth, ``Improving the granularity of access control for Windows 2000,”  ACM Trans. on Information and System Security, Vol. 5, No. 4, Nov. 2002, pages 398-437.

  1. Presentation 2, 4/21/05 2nd half: Faisal T. Khan

·        Fred B. Schneider, ``Enforceable security policies,”  ACM Trans. on Information and System Security, Vol. 3, No. 1, Nov. 2000, pages 30-50.

  1. Presentation 5, 4/28/05 1st half: Angela Orebaugh

·        P. Ning, Y. Cui, D. S. Reeves, and D. Xu,  ``Techniques and Tools for Analyzing Intrusion Alerts’’, ACM Transactions on Information and Systems Security, vol.7, no. 2, pp. 274-318, May 2004.

  1. Presentation 6, 4/28/05 2nd half: Vijayant Dhankhar

·        Steve Barker, Peter J. Stuckey, ``Flexible access control policy specification with constraint logic programming,” ACM Trans. on Information and System Security, Vol. 6, No. 4, Nov. 2003, pages 501-546.

  1. Presentation 7, 5/5/05 1st half: Ram Krishnan

·        Papers to be announced

Available Papers (in no particular order)

  1. Duminda Wijesekera, Sushil Jajodia, ``A propositional policy algebra for access control,'' ACM Trans. on Information and System Security, Vol. 6, No. 2, May 2003, pages 286-325.
  2. Elisa Bertino, Barbara Catania, Elena Ferrari, Paolo Perlasca.  ``A logical framework for reasoning about access control models,''  ACM Trans. on Information and System Security, Vol. 6, No. 1, Feb. 2003, pages 71-127.
  3. Robert Grimm, Brian N. Bershad, ``Separating access control policy, enforcement, and functionality in extensible systems,’’  ACM Trans. on Computer  Systems, Vol. 19, No. 1, Nov. 2001, pages 36-70.