Database Security 40-925 
  CE Department- Sharif University of Technology 2 - Group 1 

  Main Menu
   Home
   Syllabus
   Assignments
   Grades
   Calendar
   Discussion Area
   Links
   Resources


Announcments

  1386-05-13 August 04, 2007 08:22 AM  
Course Grades have been uploaded. If you have any problem with your grade announce Mr Amini today (just today by 4.00 pm). See your grade

  1386-04-24 July 15, 2007 01:23 PM  
Research Paper Presentation: Saturday (86/4/30)
The place will be announced later.
Find the presentation schedule in Resources/Presentation Scheduling

  1386-03-06 May 27, 2007 12:15 PM  
The slides of Access Control in New Computational Environments have been uploaded!

  1386-03-01 May 22, 2007 05:50 AM  
ARBAC and Oracle Security slides which are presented by Mr Hafez Ghorani have been uploaded!

  1386-02-16 May 06, 2007 11:30 AM  
Mid Term Exam: Sunday 23rd of Ordibehesht (86/2/23).
From the begining to the end of MAC models.

  1386-02-18 May 08, 2007 01:16 PM  
Deadline for submitting your research progress report has been extended to 86/2/20 86/2/28 - 23:59. You should prepare your report in at least 3 pages and at most 6 pages and it is supposed to cover the following parts:
1- Abstract
2- Introduction
3- Related Work
4- Your Proposal
5- Conclusion
6- References
In this step you should concentrate on surveying other similar research and propose your ideas and contributions for completing your research activity. In the next step you should prepare a complete paper resulted from your research with more focus on your contribusions and present it in the class.
Please prepare you report following the ISCC2007 papers' template in Farsi or in English .

  1386-02-11 May 01, 2007 10:03 AM  
Slides of RBAC Model have been uploaded!

  1386-01-27 April 16, 2007 05:30 AM  
Happy New Year!

Deadline of assignment #1 extended to 86/2/1, because of failure in CE server during Norouz.

  1385-12-22 March 13, 2007 10:02 AM  
Assignment # 1 has been uploaded ! Find it on Assignments page through left menu.

  1385-12-15 March 06, 2007 12:21 PM  
A survey on classification of Access Control Models have been uploaded on Reosurces/Course Material. Please read it and send your comments to m_amini@ce.sharif.edu.

  1385-12-15 March 06, 2007 12:20 PM  
DAC Models slides have been uploaded on Resources/Course Material !

  1385-12-10 March 01, 2007 02:21 PM  
Original papers of Lampson, HRU, and Take-Grant models have been uploaded!

  1385-12-02 February 21, 2007 11:08 AM  
Research plan has been uploaded (in Resources/Research folder). New subjects will be added by the next week.

  1385-12-15 March 06, 2007 12:34 PM  
The text book has some mistakes. You can correct your book based on the followings. This note will be completed graduately.
-------------------------------------------------------------------------
P: Page   S: Section  L: Line   T: Table   F: Figure
-------------------------------------------------------------------------
P 44 - S 2.2.1 - L 14: ( S is subset of O )
-------------------------------------------------------------------------
P 46 - T 2.3 - Third Column - L 13: ( A'[s,si]=...... )
-------------------------------------------------------------------------
P 48 - L 20: ( if O in A[owner, file] )
-------------------------------------------------------------------------
P 50 - S 2.2.6: ( The title should be changed to 'Implementation based on the Model' )
-------------------------------------------------------------------------
P 64 - L 5: ( The sentence "..., the arc is barred." should be changed to "..., the arc is crossed." )
-------------------------------------------------------------------------
P 65 - L 9: ( "the dynamic action" should be changed to "the static action" )
-------------------------------------------------------------------------
P67 - From bottom L 9: ( ".. potentiality of Ej ..." should be changed to "... potentiality of Ez ..." )
-------------------------------------------------------------------------
P 68 - Number (2): ( "If an authorization Aij" should be changed to  "If an authorization Ajk" )
-------------------------------------------------------------------------
P 68 - Number (3): ( "The static action SA ..." should be changed to "The static action SA' ..." )
-------------------------------------------------------------------------
P 71 - Rule M.3 - L 2: ( "Aij" should be changed to "Aik" )
-------------------------------------------------------------------------
P 75 - S 2.5.4 - L 8: ( in the right side of the formula, "Tc*C" should be changed to "P(Tc*C)" )
-------------------------------------------------------------------------
P 75 - S 2.5.4 - L 10: ( in the right side of the formula, "<... , ...>" should be changed to "{<... , ...>}" )
-------------------------------------------------------------------------

  1385-11-24 February 13, 2007 02:02 PM  
Unfortunately, because of some problems Tuesday's session was cancelled. I will take the quiz on next Saturday (85/11/29). Please annonce your classmates.

  1386-05-13 August 04, 2007 08:17 AM  
The course mailing list is ready. Please subscribe yourself in Databsae Security Mailing List !

  1385-11-18 February 07, 2007 02:46 PM  
Please read the followings to warm up for the course:
 - Matt Bishop, “Computer Security: Art and Science”, Addison Wesley, 2003. (Chapter one)
 - Elisa Bertino and Ravi Sandhu: Database Security-Concepts, Approaches, and Challenges. IEEE Trans. Dependable and Secure Computing 2(1): 2-19, 2005.

You can find them in (Resources/Course Referenced Papers) page !

  1385-11-18 February 07, 2007 02:39 PM  
Happy New Semester !

Instructor:
Dr Rasool Jalili
(jalili AT sharif.edu)

3 Units
13.30 pm - 15.00 pm

 This website is visited 7093 times since February 2007. Updated Monday 2020-09-07 09:10