IT 962 Spring 2006

Prof. Ravi Sandhu

Examination 1

02/16/06

 

Due before class on 02/23/06

 

This is an examination.  You must write the answer yourself without ANY discussion with anyone else.  You are free to consult whatever literature you choose to.

 

Provide a statement with your submission stating, I have not given help or taken help from anyone on this assignment.

 

Please submit via email to sandhu@gmu.edu or fax to 253 563 3509 before class on 02/23/06.

 

Answer any one of the following questions and note that the solution limit is increased to 1000 words.

  1. Read the following paper
    • "Privacy-preserving data mining: why, how, and when." Vaidya, J. and Clifton, C., IEEE Security and Privacy, Vol 2, No 6, Nov-Dec 2004, Pages: 19-27.
    Discuss in 1000 words or less how UCON and P-E-I can be related to the problems discussed in this paper.
  2. Read the following paper
    • "A framework for countering denial-of-information attacks." Conti, G. and Mustaque Ahamad, IEEE Security and Privacy, Vol 3, No 6, Nov-Dec 2005, Pages: 50-56.
    Discuss in 1000 words or less how UCON and P-E-I can be related to the problems discussed in this paper.