Logistics

Room:  ST I, 131
Time:  Wed., 4:30 - 7:10

Class Webpage:   http://mason.gmu.edu/~icervasa/courses/06-ISA767
http://classweb.gmu.edu/icervasa/courses/06-ISA767

Instructor:  Iliano Cervesato
Office hours:  Wed. 3:30 - 4:30 or by appointment
Office:  ST II, 229
Email:  (please put "ISA 767" in the subject line)
Phone:  703-993-8935

Teaching Assistant:  Ram Krishan
Office hours:  Mon. 2:00 - 3:00, Tue. 2:00 - 3:00, or by appointment
Office:  ST II, 468
Email:  (please put "ISA 767" in the subject line)
Phone:  703-993-1668

Course Yahoo Group:
Post message: 
Subscribe: 
Unsubscribe: 

News!

1/26/06 Temporary class web page created
1/26/06 created
2/4/06 Homework 1 released
2/8/06 Instructor gets !!!
2/9/06 Project page created
2/9/06 Official class page created
2/26/06 Midterm released
3/26/06 Homework 2 released
4/19/06 Final released

About this course

Description

The goal of this course is to explore recent and advanced security issues in e-commerce. Some tentative topics of this course are access control models (role-based access control, usage control, etc) and architectures, digital rights management, intellectual property and copyrights protections, security in recent and emerging distributed systems such as P2P, trusted computing, identity management, denial of service, etc.

Prerequisites

Readings

No text book is required. The course extensively uses papers from literature. Reading the listed papers is mandatory.

Further References

Earlier editions of this course have suggested the following books for further information on issues to e-commerce. While they contain valuable information, it should be noted that e-commerce is evolving so rapidly that any text older than 2 or 3 year risks being obsolete in some aspects.

Grading

Tasks and Percentages

Research Projects

See the project page for details

Schedule    [   week   1,   2,   3,   4,   5,   Midterm,   6,   Spring Break,   7,   8,   9,   10,   11,   12,   13,   Final   ]

Week 1
Jan.25
Welcome and Course Introduction Equipment malfunction caused the class to be dismissed early
Week 2
Feb. 1
Introduction to Secure E-commerce, Role-Based Access Control (RBAC)
Week 3
Feb. 8
RBAC Administration
Week 4
Feb. 15
Usage Control (UCON) Models Xinwen Zhang kindly agreed to give this lecture
Week 5
Feb. 22
Attribute Mutability - UCON Architecture - Windows Right Management System
Mar. 1 Midterm exam week (no class)
Week 6
Mar. 8
Digital Rights Management (DRM)
Mar. 15 Spring Break
Week 7
Mar. 22
Denial-of-Service (DoS)
Week 8
Mar. 29
Security Issues in Peer-to-Peer (P2P) Communication
Week 9
Apr. 5
Trusted Computing and Applications for Distributed Systems
Week 10
Apr. 12
Federated ID
Week 11
Apr. 19
Student Research Project Presentation
  1. Farrukh Kamran, Hatim Hussein: Federated Identity Management    [slides  |  paper]
  2. Kory Embrey: Framework for Digital Rights Management of Non-Traditional Digital Contents    [slides  |  paper]
  3. Jaffar Nassiry: Voice over IP    [slides  |  paper]
  4. Constantine Gikas, Anas Lahrim: Digital Rights Management - A Standard in Flux    [slides  |  paper]
Week 12
Apr. 26
Student Research Project Presentation
  1. Mike Fuller: M-Commerce and Security    [slides  |  paper]
  2. Chris Feldmeier: Limiting Inheritance of Permission in Access Control Models    [slides  |  paper]
  3. Samson Lemma: Method of Mitigating DDoS Attack by Randomly Selecting and Dynamically Changing the Routing Information    [slides  |  paper]
  4. Prem Jadhwani: The Benefit and Economic Impact of RBAC and Real-World Implementations of RBAC    [slides  |  paper]
  5. Vishnu Paturi: Web services and Security: Different standards and implementation - Comparison    [slides  |  paper]
Week 13
May 3
Student Research Project Presentation
  1. Anis Alazzawe, Murad Mehmet, Asad Nawaz: Game Theory in IDS    [slides  |  paper]
  2. Chan Yoon: Host-Based Anomaly Detection Techniques for Electronic Commerce    [slides  |  paper]
  3. Joshua Davis, Tim Orr: A Case for Increased Protection in Digital Certificates    [slides  |  paper]
  4. Ayman Mohamed, Mohamed Rajani, Clate Stansbury: E-Commerce Security Technologies: An Evaluation Using the Metasploit Framework    [slides  |  paper]
  5. Fouad Al-Kohlany: XML Relational Mapping    [slides  |  paper]
May 10 Final exam week (no class)
  • Final exam due by Friday May 12 (Strict!)
  • Final research paper due by Friday May 12 (Strict!)

Acknowledgements

The slides posted also include material by Jaehong Park (University of Maryland), Ravi Sandhu (George Mason University), and Xinwen Zhang (George Mason University).


Iliano Cervesato