IT 962 Spring 2006
Prof. Ravi Sandhu
Examination 1
02/16/06
Due before class on 02/23/06
This is an examination.
You must write the answer yourself without ANY discussion with anyone
else. You are free to consult whatever
literature you choose to.
Provide a statement with your submission stating, I have
not given help or taken help from anyone on this assignment.
Please submit via email to sandhu@gmu.edu
or fax to 253 563 3509 before class on 02/23/06.
Answer any one of the following questions and note that the solution limit is increased to 1000 words.
- Read the following paper
-
"Privacy-preserving data mining: why, how, and when."
Vaidya, J. and Clifton, C., IEEE Security and Privacy, Vol 2, No 6, Nov-Dec 2004, Pages: 19-27.
Discuss in 1000 words or less how UCON and P-E-I can be related to the problems discussed in this paper.
- Read the following paper
-
"A framework for countering denial-of-information attacks."
Conti, G. and Mustaque Ahamad,
IEEE Security and Privacy, Vol 3, No 6, Nov-Dec 2005, Pages: 50-56.
Discuss in 1000 words or less how UCON and P-E-I can be related to the problems discussed in this paper.