About
Advance Program
Call for Papers
Important Dates
Author Instructions
Program Committee
Officers
Registration
Location
Miscellaneous
Since 1995

 

Maintained and
Sponsored by

SACMAT 07

Date
Event
Time
June 20, 2007 Welcome 8:30– 9:00

Session 1: Keynote Address

Thoughts on Application Layer Access Control

Jorge Cuellar, Siemens Corporate Technology, Munich, Germany

9:00– 10:00

Session 2: Policy Management


10:00 – 11:00
An Approach to Evaluate Policy Similarity

Dan Lin, Prathima Rao,Elisa Bertino, Purdue University,USA
Jorge Lobo,IBM T. J. Watson Research Center,USA

 
A Posteriori Policy Enforcement

Sandro Etalle,University of Twente,The Netherlands.
William H. Winsborough,University of Texas San Antonio,USA

 
Coffee Break 11:00 – 11:30

Session 3: Access Control in Novel Systems

 

11:30 – 12:30
Enforcing Access Control Over Data Streamss

Barbara Carminati,University of Insubria at Varese,Italy.
Elena Ferrari,University of Insubria at Varese, Italy
Kian Lee Tan, National University of Singapore, Singapore

 

Fine-grained Access Control to Web Databases

Alex Roichman, The Open University,Israel
Ehud Gudes,The Open University and Ben-Gurion University,Israel

 
Lunch 12:30 – 2:00

Session 4: Privacy Management

 

2:00 – 3:30
Privacy-Aware Role Based Access Control

Qun Ni , Elisa Bertino, Purdue University, USA
Alberto Trombetta , Insubria University , Italy
Jorge Lobo,IBM Watson Research Center, USA

 
A Privacy Preserving Assertion Based Policy Language for Federation Systems

Anna Cinzia Squicciarini,Purdue University,USA
Ayca Azgin Hintoglu, Sabanci University, Turkey
Elisa Bertino, Purdue University ,USA
Yucel Saygin,Sabanci University ,Turkey

 
Distributed Access Control: A Privacy-conscious Approach

Bogdan Cautis,INRIA Futurs,France


Tea Break 3:30 – 4:00

Session 5: Secure Operating Systems


4:00 – 5:30
Towards a VMM-based Usage Control Framework for OS Kernel Integrity Protection

Min Xu , Xuxian Jiang , Ravi Sandhu, George Mason University and TriCipher Inc. ,USA
Xinwen Zhang, Samsung Information Systems America, USA

 
Managing the Risk of Covert Information Flows in Virtual Machines Systems

Trent Jaeger, Yogesh Sreenivasan, Penn State , United States
Reiner Sailer,IBM TJ Watson Research Center, United States

 
A Logical Specification and Analysis for SELinux MLS

Boniface Hicks ,Sandra Rueda, Luke St. Clair. Trent Jaeger, Patrick McDaniel,Penn State, USA

 
June 21, 2007
Administrative Remarks 8:45– 9:00

Session 8: Industry Report


9:00 – 10:00

Session 9: Consistency Enforcement and Secure Grids

 

10:00 – 11:00
Lightweight Consistency Enforcement Schemes for Distributed Proofs with Hidden Subtrees

Adam J. Lee , Kazuhiro Minami , Marianne Winslett
University of Illinois at Urbana-Champaign,USA

 
Mesh: Secure, Lightweight Grid Middleware Using Existing SSH Infrastructure

Paul Kolano,NASA Ames Research Center,USA

 
Coffee Break 11:00 – 11:30

Session 10: Coalition Data Sharing

 

11:30 – 12:30

Chinese-Wall Process Confinement for Practical Distributed Coalitions

Yasuharu Katsuno, Yuji Watanabe , Sanehiro Furuichi , Michiharu Kudo
IBM Tokyo Research Laboratory,Japan

 
Using Semantics for Automatic Enforcement of Access Control Policies among Dynamic Coalitions

Janice Warner,Vijayalakshmi Atluri , Jaideep Vaidya
Rutgers University, USA
Ravi Mukkamala .Old Dominian University, USA

 
Lunch 12:30 – 2:00

Session 11: Short Papers: High Assurance Systems

 

2:00 – 3:40

Multilevel Filesystems in Solaris Trusted Extensionss

Glenn Faden,Sun Microsystems, USA

 

A Formal Approach for Testing Security Rules

Wissam Mallouli ,Jean-Marie Orset , Ana Cavalli ,GET/INT Evry, SAMOVAR, France
Nora Cuppens , Frédéric Cuppens
GET/ENST Bretagne, Franc

 

New Constructions for Provably-Secure Time-Bound Hierarchical Key Assignment Schemes

Alfredo De Santis , Anna Lisa Ferrara, Barbara Masucci
University of Salerno, ITALY

 

Role Engineering using Graph Optimisation

Dana Zhang , Kotagiri Ramamohanarao
The University of Melbourne, Australia

 

PEI Models for Scalable, Usable and High-Assurance Information Sharing

Ram Krishnan ,George Mason University,USA
Ravi Sandhu , George Mason University & TriCipher Inc., USA
Kumar Ranganathan , Intel Corporation , India

 


Tea Break

3:40 – 4:10

Session 12: Short Papers: Access Control

 

4:10 – 5:30

Discretionary Access Control with the Administrative Role Graph Model

He Wang , : Sylvia L. Osborn
University of Western Ontario ,Canada

 

Inter-domain Role Mapping and Least Privilege

Liang Chen , Jason Crampton
Royal Holloway, University of London , United Kingdom

 

A note on the formalisation of UCON

Helge Janicke ,Antonio Cau ,Hussein Zedan ,De Montfort University, UK

 

Formalizing XML Access Control for Update Operations

Irini Fundulaki,University of Edinburgh, UK
Sebastian Maneth,National ICT Australia Ltd and University of New South Wales Australia
 

 
June 22, 2007
Administrative Remarks 8:45– 9:00

Session 13: Panel Discussion - I:

Access Control for Assured Information Sharing

9:00 – 11:00

Coffee Break

11:00 – 11:30

Session 14: Roles and Polices

 

11:30 – 12:30
The Role Mining Problem: Finding a Minimal Descriptive Set of Rolest

Jaideep Vaidya, Vijayalakshmi Atluri, Qi Guo
Rutgers University USA

 
Specifications of A High-level Conflict-Free Firewall Policy

Bin Zhang,Depaul University, Ehab AL-Shaer , Radha Jagadeesan ,James Riely, Corin Pitcher DePaul University USA

 
Lunch 12:30 – 2:00

Session 15: Novel Access Control Techniques

 

2:00 – 3:30
Action-Status Access Control

Steve Barker,King's College, London,UK

 
Policy Morph: Interactive Policy Transformations for a Logical Attribute-Based Access Control Framework

Michael LeMay, Omid Fatemieh , Carl Gunter
University of Illinois at Urbana-Champaign ,USA

 
Towards Realizing a Formal RBAC Model in Real Systems

Gail-Joon Ahn , Hongxin Hu, UNC Charlotte, USA

 
Tea Break 3:30 – 4:00

Session 16: Panel Discussion - II:

Directions for Access Control and Policy Management

4:00 – 5:30

 


Copyright (c) 2005-7 ACM SACMAT All rights reserved.