Fault-tolerant authentication and group key management in mobile computing, B. Bhargava, S. Kamisetty and S. Madria, in International Conference on Internet Computing (LC 2000), Las Vegas, June 2000
Adaptability and Security in Multimedia Systems, B. Bhargava, in Proceedings of the IEEE International Conference on Database Expert Systems (DEXA-99), Florence, 1999, pp. 1-5
An Adaptable Network Architecture for Multi-media Traffic Management and Control, S. Wang and B. Bhargava, in Proceedings of the IEEE International Conference on Multimedia System, New York, August 2000, pp 670-675
Secure Mobile Networks, B. Bhargava, to appear in Proceedings
of Conference on Dependable Computing, Los Angeles, Dec. 2000
Web Schema in WHOWEDA, S. Sourav,W. Ne and S. Madria, in Proceedings of ACM workshop on DOLAP, Washington DC, Nov. 2000.
Secured Web Access, M. Mohania, V. Kumar, Y. Kambayashi and B. Bhargava, in International Conference on Digital Libraries: Research and Practice, Nov 13-16, Kyoto, Japan
Security in Data Warehousing, B. Bhargava, in International Conference on Data Warehouse & Knowledge Discover, DaWak-2000, Sept. 2000, London, UK
Reports: The following reports are in progress:
Survivability and secure communications are essential in a mobile computing environment. We propose to conduct a series of experiments that will lead to the development of new authentication and key management techniques for wireless communications. We study the implementation of various authentication schemes on the overall system performance. We propose a technique to achieve fault-tolerant mobile node authentication in an efficient way. We will evaluate how various secure group communication and access control techniques fit into the wireless world by conducting scientific experiments in a systematic way.
Students: Yi Lu, David Mcclure
Student: Ahsan Habib
Data warehouse is an integrated repository derived from multiple source (operational and legacy) databases. The data warehouse is created byeither replicating the different source data or transforming them to new representation. This process involves reading, cleaning, aggregating and storing the data in the warehouse model. The software tools are used to access the warehouse for strategic analysis, decision-making, marketing types of applications. It can be used for inventory control of shelf stock in many departmental stores.
We focus on the following ideas that can contribute towards warehouse
security:
1. Replication control
2. Aggregation and Generalization
3. Exaggeration and Misleading
4. Anonymity
5. User Profile Based Security
Students: Yuhui Zhong, Kyung Lyung Hong, Haiqin Wei, Sha Tang, Weizhen Tu, Vishal Lodha