Go to Main Content

Purdue Self-Service

 

HELP | EXIT

Catalog Entries

 

Spring 2023
May 03, 2024
Transparent Image
Information Select the Course Number to get further detail on the course. Select the desired Schedule Type to find available classes for the course. The Schedule Type links will be available only when the schedule of classes is available for the selected term.

CS 55600 - Data Security And Privacy
Credit Hours: 3.00.  Data security and privacy is an important part of information security. This course provides an introduction to the fundamental principles and techniques for data security and privacy. The course covers fundamental theories of access control, discretionary access control, mandatory access control, and role-based access control, database access control approaches including grant revoke, virtual private databases and labelled databases, database encryption. On privacy, it covers data anonymization, re-identification attacks, definition, primitives, and applications of differential privacy.
3.000 Credit hours

Syllabus Available
Levels: Undergraduate, Graduate, Professional
Schedule Types: Distance Learning, Lecture

Offered By: College of Science
Department: Computer Science

Course Attributes:
Upper Division

May be offered at any of the following campuses:     
      West Lafayette

Learning Outcomes: 1.  Explain the limitation of discretionary access control and the impacts to security. (E,Q,W) 2.  Explain the definition, enforcement, and challenges for multi-level security, including the Bell LaPadula model, non-interference, and covert channels. (E,Q,W) 3.  Articulate integrity models (Biba and Clark-Wilson), and the difference between integrity and confidentiality. (E,Q,W) 4.  Explain the main database security mechanism, including grant revoke model, content-based and context-based access control, virtual private databases, labelled databases, and data encryption. (E,Q,W) 5.  Articulate the limitations of data anonymization for achieving privacy, and the strengths and limitations of privacy notions including differential privacy. (EQW) 6.  Identify, implement, and deploy differential privacy mechanisms for problem settings. (P)



Return to Previous New Search XML Extract
Transparent Image
Skip to top of page
Release: 8.7.2.4