2/21/2011 | 7:00am-8:00am | Breakfast | ||
8:00am-8:30am | Welcome | Ravi Sandhu, Elisa Bertino, Jeff Reich | ||
8:30am-9:30am | Inaugural Keynote Talk: The Challenge of Data and Application Security: Are We Up to It? | Ravi Sandhu, UTSA | ||
9:30am-10:30am | KeyNote Talk 1: Key Dependent Message Security: Recent Results and Applications | Moti Yung, Google | ||
10:30am-11:00am | Coffee Break | |||
11:00am-12:30pm | Paper Session 1 (3 papers): Security and Privacy Techniques for Social Networks | Session Chair: Murat Kantarcioglu (University of Texas at Dallas) | ||
Towards Active Detection of Identity Clone Attacks on Online Social Networks | Lei Jin, University of Pittsburgh; James Joshi, University of Pittsburgh; Hassan Takabi, University of Pittsburgh | |||
Virtual Private Social Networks | Mauro Conti, Vrije Universiteit Amsterdam; Arbnor Hasani, Vrije Universiteit Amsterdam; Bruno Crispo, University of Trento | |||
A Probability-based Approach to Modeling the Risk of Unauthorized Propagation of Information in On-line Social Networks | Barbara Carminati,
University of Insubria; Elena Ferrari,
University of Insubria; Sandro Morasca, University of Insubria; Davide Taibi, University of Insubria; |
|||
12:30pm-1:30pm | Lunch | |||
1:30pm-3:00pm | Paper Session 2 (3 papers): Insider Threats and Data Leakage | Session Chair: Ram Krishnan (University of Texas at San Antonio) | ||
Detection of Anomalous Insiders in Collaborative Environments via Relational Analysis of Access Logs | You Chen, Vanderbilt University; Bradley Malin, Vanderbilt University | |||
LeakProber: A framework for profiling sensitive data leakage path | Junfeng Yu, Pennsylvania State University University Park; ShengZhi Zhang, Pennsylvania State University University Park; Zhitang Li, Huazhong university of Sci&Tech; Peng Liu, Pennsylvania State University University Park | |||
Distributed Data Usage Control for Web Applications: A Social Network Implementation | Prachi Kumari, Karlsruhe Institute of Technology; Alexander Pretschner, Karlsruhe Institute of Technology; Jonas Peschla, TU Kaiserslautern; Jens-Michael Kuhn, TU Kaiserslautern | |||
3:00pm-3:30pm | Coffee Break | |||
3:30pm-5:00pm | Paper Session 3 (3 papers): Performance Evaluation and Enhancement | Session Chair: James Joshi (University of Pittsburgh) | ||
MyABDAC: Compiling XACML Policies for Attribute-Based Database Access Control | Sonia Jahid, University of Illinois at Urbana-Champaign; Imranul Hoque, University of Illinois at Urbana-Champaign; Carl A. Gunter, University of Illinois at Urbana-Champaign; Hamed Okhravi, University of Illinois at Urbana-Champaign | |||
Implementation and Performance Evaluation of Privacy-Preserving Fair Reconciliation Protocols on Ordered Sets | Daniel A. Mayer, Stevens Institute of Technology; Susanne Wetzel, Stevens Institute of Technology; Ulrike Meyer, RWTH Aachen; Dominik Teubert, RWTH Aachen | |||
An Empirical Assessment of Approaches to Distributed Enforcement in Role-Based Access Control (RBAC) | Marko Komlenovic, University of Waterloo; Mahesh Tripunitara, University of Waterloo; Toufik Zitouni, University of Waterloo | |||
2/22/2011 | 7:30am-8:30am | Breakfast | ||
8:30am-9:30am | KeyNote Talk 2: Old, New, Borrowed, Blue -- A perspective on the evolution
of mobile platform security architectures |
N. Asokan, Nokia | ||
9:30am-10:30 | Paper session 4 (2 papers): Secure Provenance | Session Chair: Ravi Sandhu (University of Texas at San Antonio) | ||
A Language for Provenance Access Control | Tyrone Cadenhead, University of Texas at Dallas; Vaibhav Khadilkar, University of Texas at Dallas; Murat Kantarcioglu, University of Texas at Dallas; Bhavani Thuraisingham, University of Texas at Dallas | |||
Non-Interactive Editable Signatures for Assured Data Provenance | Haifeng Qian, East China Normal University; Shouhuai Xu, University of Texas at San Antonio | |||
10:30am-11:00am | Coffee Break | |||
11:00am-12:30pm | Paper Session 5 (3 papers): Privacy Threats and Protection Techniques | Session Chair: Barbara Carminati (University of Insubria) | ||
Identifying a Critical Threat to Privacy through Automatic Image Classification | David Lorenzi, Rutgers University; Jaideep Vaidya, Rutgers University | |||
k-out-of-n Oblivious Transfer based on Homomorphic Encryption and Solvability of Linear Equations | Mummoorthy Murugesan, Purdue University; Wei Jiang, Missouri University of Science and Technology; Ahmet Erhan Nergiz, Purdue University; Serkan Uzunbaz, Purdue University | |||
Mixture of Gaussian Models and Bayes Error under Differential Privacy | Bowei Xu, Purdue Universityi; Murat Kantarcioglu, University of Texas at Dallas; Ali Inan, Isik University | |||
12:30pm-1:30pm | Lunch | |||
1:30pm-3:00pm | Paper Session 6 (3 papers): Novel Models and Systems for Access Control | Session Chair: Dan Thomsen | ||
Relationship-Based Access Control: Protection Model and Policy Language | Philip Fong, University of Calgary | |||
Enforcing Physically Restricted Access Control for Remote Data | Michael Kirkpatrick, Purdue University; Sam Kerr, Purdue University | |||
Towards Defining Semantic Foundations for Purpose-Based Privacy Policies | Mohammad Jafari, University of Calgary; Philip Fong, University of Calgary; Reihaneh Safavi-Naini, University of Calgary; Ken Barker, University of Calgary; Nicholas Paul Sheppard, Queensland University of Technology | |||
3:00pm-3:30pm | Coffee Break | |||
3:30pm-5:00pm | Session 7: Invited Industry and Application Papers | Session Chair: Elisa Bertino (Purdue University) | ||
Practical Policy Patterns | Dan Thomsen (Sandia) | |||
Security Challenges for Embedded Systems | Hal Aldridge (Sypris Electronics) | |||
The Optimization of Situational Awareness for Insider Threat Detection | Kenneth Brancik (Northrop Grumman), Gabriel Ghinita (Purdue University) | |||
2/23/2011 | 7:00am-8:00am | Breakfast | ||
8:00am-9:00am | KeyNote Talk 3: Software Security: Is OK good enough? | John Dickson, Denim Group | ||
9:00am-10:00am | Paper session 8 (2 papers): Secure Data Outsourcing | Session Chair: Gabriel Ghinita (Purdue University) | ||
Fair and Dynamic Proofs of Retrievability | Qingji Zheng, University of Texas at San Antonio; Shouhuai Xu, University of Texas at San Antonio | |||
RASP: Efficient Multidimensional Range Query on Attack-Resilient Encrypted Databases | Keke Chen, Wright State University; Ramakanth Kavuluru, Wright State University; Shumin Guo, Wright State University | |||
10:00am-10:30am | Coffee Break | |||
10:30am-11:30am | Paper session 9 (2 papers): Novel Applications of Privacy Techniques | Session Chair: Keke Chen (Wright State University) | ||
Privacy-Preserving Activity Scheduling on Mobile Devices | Igor Bilogrevic, EPFL; Murtuza Jadliwala, EPFL; Jean-Pierre Hubaux, EPFL; Imad Aad, Nokia; Valtteri Niemi, Nokia | |||
Privacy-Enhanced Reputation-Feedback Methods to Reduce Feedback Extortion in Online Auctions | Michael Goodrich, University of California, Irvine; Florian Kerschbaum, SAP Research | |||
11:30am-12:30pm | Panel: Research Agenda for Data and Application Security | Panel
Chair: X. Sean Wang (University of Vermont) Mauro Conti (Vrije Universiteit Amsterdam) Calton Pu (Georgia Tech) Ravi Sandhu (UTSA) Dan Thomsen (Sandia) Bhavani Thuraisingham (UTDallas) |
||
12:30pm-12:45pm | Conference Closing and Concluding Remarks |