The goal of this course is to explore recent and advanced security issues in
e-commerce. Some tentative topics of this course are access control models
(role-based access control, usage control, etc) and architectures, digital
rights management, intellectual property and copyrights protections, security
in recent and emerging distributed systems such as P2P, trusted computing,
identity management, denial of service, etc.
Earlier editions of this course have suggested the following books for further
information on issues to e-commerce. While they contain valuable information,
it should be noted that e-commerce is evolving so rapidly that any text older
than 2 or 3 year risks being obsolete in some aspects.
Week 1 Jan.25 |
Welcome and Course Introduction
Equipment malfunction caused the class to be dismissed
early
|
Week 2 Feb. 1 |
Introduction to Secure E-commerce,
Role-Based Access Control (RBAC)
- Slides:
- Readings:
- Butler Lampson,
Computer Security in the Real World,
IEEE Computer, June 2004.
- Ravi Sandhu,
Engineering Authority and Trust in Cyberspace: The OM-AM and RBAC Way,
ACM, RBAC 2000.
- Ravi Sandhu, Edward Coyne, Hal Feinstein and Charles Youman,
Role-Based Access Control Models,
IEEE Computer, Volume 29, Number 2, February 1996.
|
Week 3 Feb. 8 |
RBAC Administration
|
Week 4 Feb. 15 |
Usage Control (UCON) Models
Xinwen Zhang kindly
agreed to give this lecture
|
Week 5 Feb. 22 |
Attribute Mutability - UCON Architecture - Windows Right
Management System
|
| Mar. 1 |
Midterm exam week (no class)
|
Week 6 Mar. 8 |
Digital Rights Management (DRM)
- Slides (2/page, 6/page)
- Readings:
- Renato Iannella,
Digital Rights Management (DRM) Architectures
- John Erickson,
Fair Use, DRM, and Trusted Computing,
Communication of ACM, April 2003
- Edward Felten,
A Skeptical View of DRM and Fair Use,
Communication of ACM, April 2003
- Alex Halderman,
Analysis of the MediaMax CD3 Copy-Prevention System,
Princeton University Computer Science Technical Report TR-679-03.
- Midterm due on
March 12th
- Research
Project: Abstract, outline with short description
for each section and partial references due
|
| Mar. 15 |
Spring Break
|
Week 7 Mar. 22 |
Denial-of-Service (DoS)
- Slides (2/page, 6/page)
- Readings: TBA
- Catherine Meadows,
A Cost-Based Framework for Analysis of Denial of Service in Networks, Journal of Computer Security, 9(1/2), pp.143-164, 2000
- Ari Juels, John Brainard,
Client puzzles: A cryptographic defense against connection depletion attacks,
Networks and Distributed Security Systems, pp.151-165, 1999
- Homework 2 released
|
Week 8 Mar. 29 |
Security Issues in Peer-to-Peer (P2P) Communication
- Slides (2/page, 6/page)
- Readings:
- Dejan Milojicic et. al.,
Peer-to-Peer computing,
Technical Report HPL-2002-57, HP Lab, 2002.
- Peter Biddle et. al.,
The Darknet and the Future of Content Distribution,
ACM DRM workshop, 2002.
- M. Einhorn and B. Rosenblatt,
Peer-to-Peer Networking and Digital Rights Management: How Market Tools can Solve Copyright Problems,
Technical Report, CATO Institute, 2005.
|
Week 9 Apr. 5 |
Trusted Computing and Applications for Distributed Systems
|
Week 10 Apr. 12 |
Federated ID
|
Week 11 Apr. 19 |
Student Research Project Presentation
- Farrukh Kamran, Hatim Hussein:
Federated Identity Management
[slides
|
paper]
- Kory Embrey:
Framework for Digital Rights Management of Non-Traditional
Digital Contents
[slides
|
paper]
- Jaffar Nassiry:
Voice over IP
[slides
|
paper]
- Constantine Gikas, Anas Lahrim:
Digital Rights Management - A Standard in Flux
[slides
|
paper]
|
Week 12 Apr. 26 |
Student Research Project Presentation
- Mike Fuller:
M-Commerce and Security
[slides
|
paper]
- Chris Feldmeier:
Limiting Inheritance of Permission in Access Control Models
[slides
|
paper]
- Samson Lemma:
Method of Mitigating DDoS Attack by Randomly Selecting and
Dynamically Changing the Routing Information
[slides
|
paper]
- Prem Jadhwani:
The Benefit and Economic Impact of RBAC and Real-World
Implementations of RBAC
[slides
|
paper]
- Vishnu Paturi:
Web services and Security: Different standards and
implementation - Comparison
[slides
|
paper]
|
Week 13 May 3 |
Student Research Project Presentation
- Anis Alazzawe, Murad Mehmet, Asad Nawaz:
Game Theory in IDS
[slides
|
paper]
- Chan Yoon:
Host-Based Anomaly Detection Techniques for Electronic
Commerce
[slides
|
paper]
- Joshua Davis, Tim Orr:
A Case for Increased Protection in Digital Certificates
[slides
|
paper]
- Ayman Mohamed, Mohamed Rajani, Clate Stansbury:
E-Commerce Security Technologies: An Evaluation Using the
Metasploit Framework
[slides
|
paper]
- Fouad Al-Kohlany:
XML Relational Mapping
[slides
|
paper]
|
| May 10 |
Final exam week (no class)
- Final exam due by Friday
May 12 (Strict!)
- Final research paper due by Friday May 12 (Strict!)
|