Session details
Monday July 29th
Opening:
9.00 - 10.30
on OHP
|
Welcome!
General Chair: Ken Moody
"Conflicts of Interest in Application Security"
Invited keynote:
Ross Anderson
|
Session 1:
11.00 - 13.00
talk
talk
talk
talk
|
Authorization and Security policies
Chair: Reind van der Riet
"Shielding the OASIS RBAC infrastructure from cyber-terrorism"
András Belokosztolszki and David Eyers
"A Process Algebraic Approach to Security Policies"
P Y A Ryan and Ragni Ryvold-Arnesen
"Privilege Administration for the Role Graph Model"
Cecilia Ionita and Sylvia Osborn
"Implementing RBAC Policies in PL/SQL"
Steve Barker, Terry Fanning and Paul Douglas
|
Session 2:
14.15 - 16.15
talk
talk
talk
talk
|
XML and Multimedia security
Chair: Sylvia Osborn
"Towards Secure XML Federations"
Lingyu Wang, Duminda Wijesekera and Sushil Jajodia
"Secure XML Views"
Andrei Stoica and Csilla Farkas
"A Uniform Indexing Scheme for Geo-spatial Data and Authorizations"
Vijayalakshmi Atluri and Pietro Mazzoleni
"An Access Control System for SVG Documents"
E Damiani, S De Capitani di Vimercati, E Fernandez-Medina and P Samarati
|
Panel:
16.45 - 18.10
|
"Privacy and Civil Liberties"
Moderator: Pierangela Samarati
|
Tuesday July 30th
Session 3:
8.45 - 10.45
talk
talk
talk
talk
|
Data mining and Damage assessment
Chair: Sujeet Shenoi
"The Security Assessment of Association Mining Algorithms"
Tom Johnsten
"Mining Malicious Data Corruption with Hidden Markov Models"
Daniel Barbara, Rajni Goel and Sushil Jajodia
"On-line Intrusion Protection by Detecting Attacks with Diversity"
James Reynolds, James Just, Ed Lawson, Larry Clough and Ryan Maglich
"Modeling and Analyzing Transaction Logging Protocols for Effective Damage Assessment"
Prahalad Ragothaman and Brajendra Panda
|
Session 4:
11.15 - 12.45
talk
talk
talk
|
Distributed systems security
Chair: Joachim Biskup
"Role Delegation for a Distributed, Unified RBAC/MAC"
M Liebrand, H Ellis, C Phillips, S Demurjian and T C Ting
"A Framework for Distributed and Cooperative Updates of XML Documents"
E Bertino, E Ferrari and G Mella
"A Study of Inference Problems in Distributed Databases"
LiWu Chang and Ira S Moskowitz
|
Wednesday July 31st
Session 5:
9.00 - 10.30
talk
talk
on OHP
|
Encryption and Key management
Chair: Sushil Jajodia
"An Anonymous and Secure Multicasting Subscription Facility"
Indrajit Ray and Indrakshi Ray
"Recertification: A Technique to Improve Services in Public-key Infrastructure"
Ravi Mukkamala, Satyam K Das and Mahantesh Halappanavar
"A Hybrid PKI Model with an Application for Secure Mediation"
Joachim Biskup and Yucel Karabulut
|
Session 6:
11.00 - 12.30
talk
talk
talk
|
Damage confinement and Vulnerability analysis
Chair: Martin Olivier
"A Meta-Programming Approach for Protecting Deductive Databases"
Steve Barker
"The Design and Implementation of a Multiphase Database Damage Confinement System"
Peng Liu and Ying Wang
"Network Modeling for Vulnerability Analysis"
C Campbell, J Dawkins, B Pollet, K Fitch and J Hale
|
Session 7:
14.00 - 15.30
talk
talk
talk
|
Implementing secure systems
Chair: Ehud Gudes
"Implementing Workflow with Microsoft's Distributed Component Object Model"
Lucas Dreyer
"Role-based EAM using X.509 Attribute Certificates"
Dongwan Shin, Gail-Joon Ahn and Sangrae Cho
"Towards a Verifiable Implementation of Programmable Security"
Stephen Magill, Bradley Skaggs, Mauricio Papa and John Hale
|
|
|