|
SACMAT 07
Date |
Event |
Time |
June 20, 2007 |
Welcome |
8:30– 9:00 |
Session 1: Keynote Address
Thoughts on Application Layer Access Control
Jorge Cuellar, Siemens Corporate Technology, Munich, Germany |
9:00– 10:00 |
Session
2: Policy Management
|
10:00 – 11:00 |
An Approach to Evaluate Policy Similarity
Dan Lin, Prathima Rao,Elisa Bertino, Purdue University,USA
Jorge Lobo,IBM T. J. Watson Research Center,USA
|
|
A Posteriori Policy Enforcement Sandro
Etalle,University of Twente,The Netherlands.
William H. Winsborough,University of Texas San Antonio,USA
|
|
Coffee Break |
11:00 – 11:30 |
Session
3: Access Control in Novel Systems
|
11:30 – 12:30 |
Enforcing Access Control Over Data Streamss
Barbara Carminati,University of Insubria at Varese,Italy.
Elena Ferrari,University of Insubria at Varese, Italy
Kian Lee Tan, National University of Singapore, Singapore
|
|
Fine-grained Access Control to Web
Databases
Alex Roichman, The Open University,Israel
Ehud Gudes,The Open University and Ben-Gurion University,Israel
|
|
Lunch |
12:30 – 2:00 |
Session
4: Privacy Management
|
2:00 – 3:30 |
Privacy-Aware Role Based Access Control Qun
Ni , Elisa Bertino, Purdue University, USA
Alberto Trombetta , Insubria University , Italy
Jorge Lobo,IBM Watson Research Center, USA
|
|
A Privacy Preserving Assertion Based Policy Language for
Federation Systems Anna Cinzia
Squicciarini,Purdue University,USA
Ayca Azgin Hintoglu, Sabanci University, Turkey
Elisa Bertino, Purdue University ,USA
Yucel Saygin,Sabanci University ,Turkey
|
|
Distributed Access Control: A Privacy-conscious Approach
Bogdan Cautis,INRIA Futurs,France
|
|
Tea Break |
3:30 – 4:00 |
Session
5: Secure Operating Systems
|
4:00 – 5:30 |
Towards a VMM-based Usage Control Framework for OS Kernel
Integrity Protection Min Xu ,
Xuxian Jiang , Ravi Sandhu, George Mason University and TriCipher Inc.
,USA
Xinwen Zhang, Samsung Information Systems America, USA
|
|
Managing the Risk of Covert Information Flows in Virtual
Machines Systems Trent Jaeger,
Yogesh Sreenivasan, Penn State , United States
Reiner Sailer,IBM TJ Watson Research Center, United States
|
|
A Logical Specification and Analysis for SELinux MLS
Boniface Hicks ,Sandra Rueda, Luke St. Clair.
Trent Jaeger, Patrick McDaniel,Penn State, USA
|
|
June 21, 2007
|
Administrative Remarks |
8:45– 9:00 |
Session
8: Industry Report
|
9:00 – 10:00 |
Session
9: Consistency Enforcement and Secure Grids
|
10:00 – 11:00 |
Lightweight Consistency Enforcement Schemes for Distributed
Proofs with Hidden Subtrees Adam
J. Lee , Kazuhiro Minami , Marianne Winslett
University of Illinois at Urbana-Champaign,USA
|
|
Mesh: Secure, Lightweight Grid Middleware Using Existing
SSH Infrastructure Paul Kolano,NASA
Ames Research Center,USA
|
|
Coffee Break |
11:00 – 11:30 |
Session
10: Coalition Data Sharing
|
11:30 – 12:30 |
Chinese-Wall Process Confinement for Practical Distributed
Coalitions
Yasuharu Katsuno, Yuji Watanabe , Sanehiro Furuichi
, Michiharu Kudo
IBM Tokyo Research Laboratory,Japan
|
|
Using Semantics for Automatic Enforcement of Access Control
Policies among Dynamic Coalitions
Janice Warner,Vijayalakshmi Atluri
, Jaideep Vaidya
Rutgers University, USA
Ravi Mukkamala .Old Dominian University, USA
|
|
Lunch |
12:30 – 2:00 |
Session
11: Short Papers: High Assurance Systems
|
2:00 – 3:40 |
Multilevel Filesystems in Solaris Trusted Extensionss
Glenn Faden,Sun Microsystems, USA
|
|
A Formal Approach for Testing Security Rules
Wissam Mallouli ,Jean-Marie Orset , Ana Cavalli
,GET/INT Evry, SAMOVAR, France
Nora Cuppens , Frédéric Cuppens
GET/ENST Bretagne, Franc
|
|
New
Constructions for Provably-Secure Time-Bound Hierarchical Key Assignment
Schemes
Alfredo De Santis , Anna Lisa Ferrara, Barbara
Masucci
University of Salerno, ITALY
|
|
Role Engineering using Graph Optimisation
Dana Zhang , Kotagiri Ramamohanarao
The University of Melbourne, Australia
|
|
PEI Models for Scalable, Usable and High-Assurance Information
Sharing
Ram Krishnan ,George Mason University,USA
Ravi Sandhu , George Mason University & TriCipher Inc., USA
Kumar Ranganathan , Intel Corporation , India
|
|
Tea Break
|
3:40 – 4:10 |
Session
12: Short Papers: Access Control
|
4:10 – 5:30 |
Discretionary Access Control with the Administrative
Role Graph Model
He Wang , : Sylvia L. Osborn
University of Western Ontario ,Canada
|
|
Inter-domain Role Mapping and Least Privilege
Liang Chen , Jason Crampton
Royal Holloway, University of London , United Kingdom
|
|
A note on the formalisation of UCON
Helge Janicke ,Antonio Cau ,Hussein Zedan ,De
Montfort University, UK
|
|
Formalizing XML Access Control for Update Operations
Irini Fundulaki,University of Edinburgh, UK
Sebastian Maneth,National ICT Australia Ltd and University of New South
Wales Australia
|
|
June 22, 2007
|
Administrative Remarks |
8:45– 9:00 |
Session
13: Panel Discussion - I:
Access Control for Assured
Information Sharing
|
9:00 – 11:00 |
Coffee Break
|
11:00 – 11:30 |
Session
14: Roles and Polices
|
11:30 – 12:30 |
The Role Mining Problem: Finding a
Minimal Descriptive Set of Rolest Jaideep
Vaidya, Vijayalakshmi Atluri, Qi Guo
Rutgers University USA
|
|
Specifications of A High-level Conflict-Free Firewall Policy
Bin Zhang,Depaul University, Ehab AL-Shaer ,
Radha Jagadeesan ,James Riely, Corin Pitcher DePaul University USA
|
|
Lunch |
12:30 – 2:00 |
Session 15: Novel Access
Control Techniques
|
2:00 – 3:30 |
Action-Status Access Control Steve
Barker,King's College, London,UK
|
|
Policy Morph: Interactive Policy Transformations for a Logical
Attribute-Based Access Control Framework Michael
LeMay, Omid Fatemieh , Carl Gunter
University of Illinois at Urbana-Champaign ,USA
|
|
Towards Realizing a Formal RBAC Model in Real Systems
Gail-Joon Ahn , Hongxin Hu, UNC Charlotte, USA
|
|
Tea Break |
3:30 – 4:00 |
Session 16: Panel Discussion
- II:
Directions for Access Control
and Policy Management |
4:00 – 5:30 |
|