WG 11.3 Annual Conference


News

Registration
Travel to Cambridge
About Cambridge
Arrival information
Accommodation
Network connection

Organisation

Programme

Speakers
Transparencies/audio

Call for Papers

IFIP WG11.3 Home
IFIP TC11 Home



IFIP WG 11.3 Conference,  2002

Session details

 


Monday July 29th


Opening:

9.00 - 10.30
 
on OHP
 
  Welcome!          General Chair:   Ken Moody

"Conflicts of Interest in Application Security"
 
Invited keynote:         Ross Anderson
 

 

Session 1:
 
11.00 - 13.00
 
 
 
talk
 
 
 
 
 
talk
 
 
 
 
 
talk
 
 
 
 
 
talk
 
 
Authorization and Security policies
 
Chair:    Reind van der Riet
 
 
"Shielding the OASIS RBAC infrastructure
from cyber-terrorism"

 
András Belokosztolszki and David Eyers
 
 
"A Process Algebraic Approach
to Security Policies"

 
P Y A Ryan and Ragni Ryvold-Arnesen
 
 
"Privilege Administration for
the Role Graph Model"

 
Cecilia Ionita and Sylvia Osborn
 
 
"Implementing RBAC Policies in PL/SQL"
 
Steve Barker, Terry Fanning and Paul Douglas
 

 

Session 2:
 
14.15 - 16.15
 
 
 
talk
 
 
 
 
 
talk
 
 
 
 
talk
 
 
 
 
 
talk
 
 
 
XML and Multimedia security
 
Chair:    Sylvia Osborn
 
 
"Towards Secure XML Federations"
 
Lingyu Wang, Duminda Wijesekera
and Sushil Jajodia
 
 
"Secure XML Views"
 
Andrei Stoica and Csilla Farkas
 
 
"A Uniform Indexing Scheme for
Geo-spatial Data and Authorizations"

 
Vijayalakshmi Atluri and Pietro Mazzoleni
 
 
"An Access Control System for SVG Documents"
 
E Damiani, S De Capitani di Vimercati,
E Fernandez-Medina and P Samarati
 

 

Panel:

16.45 - 18.10
 
"Privacy and Civil Liberties"

Moderator:    Pierangela Samarati
 

 


Tuesday July 30th


Session 3:
 
8.45 - 10.45
 
 
 
talk
 
 
 
 
 
talk
 
 
 
 
 
 
talk
 
 
 
 
 
talk
 
 
 
Data mining and Damage assessment
 
Chair:    Sujeet Shenoi
 
 
"The Security Assessment of
Association Mining Algorithms"

 
Tom Johnsten
 
 
"Mining Malicious Data Corruption
with Hidden Markov Models"

 
Daniel Barbara, Rajni Goel and Sushil Jajodia
 
 
"On-line Intrusion Protection by
Detecting Attacks with Diversity"

 
James Reynolds, James Just, Ed Lawson,
Larry Clough and Ryan Maglich
 
 
"Modeling and Analyzing Transaction Logging
Protocols for Effective Damage Assessment"

 
Prahalad Ragothaman and Brajendra Panda
 

 

Session 4:
 
11.15 - 12.45
 
 
 
 
talk
 
 
 
 
 
talk
 
 
 
 
 
talk
 
 
 
Distributed systems security
 
Chair:    Joachim Biskup
 
 
"Role Delegation for a Distributed,
Unified RBAC/MAC"

 
M Liebrand, H Ellis, C Phillips,
S Demurjian and T C Ting
 
 
"A Framework for Distributed and
Cooperative Updates of XML Documents"

 
E Bertino, E Ferrari and G Mella
 
 
"A Study of Inference Problems
in Distributed Databases"

 
LiWu Chang and Ira S Moskowitz
 

 


Wednesday July 31st


Session 5:
 
9.00 - 10.30
 
 
 
talk
 
 
 
 
 
 
talk
 
 
 
 
 
on OHP
 
 
 
Encryption and Key management
 
Chair:    Sushil Jajodia
 
 
"An Anonymous and Secure Multicasting
Subscription Facility"

 
Indrajit Ray and Indrakshi Ray
 
 
"Recertification: A Technique to Improve
 Services in Public-key Infrastructure"

 
Ravi Mukkamala,  Satyam K Das
and Mahantesh Halappanavar
 
 
"A Hybrid PKI Model with an Application
for Secure Mediation"

 
Joachim Biskup and Yucel Karabulut
 

 

Session 6:

11.00 - 12.30
 
 
 
 
talk
 
 
 
 
 
talk
 
 
 
 
 
talk
 
 
 
Damage confinement and
Vulnerability analysis

 
Chair:    Martin Olivier
 
 
"A Meta-Programming Approach for
 Protecting Deductive Databases"

 
Steve Barker
 
 
"The Design and Implementation of a Multiphase
Database Damage Confinement System"

 
Peng Liu and Ying Wang
 
 
"Network Modeling for Vulnerability Analysis"
 
C Campbell, J Dawkins, B Pollet,
K Fitch and J Hale
 

 

Session 7:
 
14.00 - 15.30
 
 
 
talk
 
 
 
 
 
 
talk
 
 
 
 
 
 
talk
 
 
 
Implementing secure systems
 
Chair:    Ehud Gudes
 
 
"Implementing Workflow with Microsoft's
Distributed Component Object Model"

 
Lucas Dreyer
 
 
"Role-based EAM using X.509
Attribute Certificates"

 
Dongwan Shin,  Gail-Joon Ahn
and Sangrae Cho
 
 
"Towards a Verifiable Implementation
of Programmable Security"

 
Stephen Magill,  Bradley Skaggs,
Mauricio Papa and John Hale
 

 


Top
Some speakers are using foils and an OHP;  an electronic version will not be provided in such cases.  Other talks are not yet available.