Date
|
Event
|
Time
|
Coffee Break |
08:00 – 08:30 |
|
June 11, 2008 |
Welcome |
8:45– 9:00 |
Session 1: Keynote Address
Managing identities and entitlements - trends, challenges, and architectural
approach
Dr.
Nataraj (Raj) Nagaratnam, IBM Distinguished Engineer
Chief Architect, Identity and SOA Security
|
9:00– 10:00 |
Coffee Break |
10:00 – 10:30 |
Session 2: Role Mining
Session chair: Axel Kern
|
10:30 – 12:00 |
Fast Exact and Heuristic Methods for Role Minimization Problems
Alina Ene (Princeton University)
William Horne (HP Labs)
Nikola Milosavljevic (Stanford University)
Prasad Rao (HP Labs), Robert Schreiber (HP Labs)
Robert E. Tarjan (HP Labs / Princeton University)
|
|
Migrating to Optimal RBAC with Minimal Perturbation
Jaideep
Vaidya,
Vijay Atluri, Qi Guo, Nabil Adam (Rutgers University)
|
|
Mining Roles with Semantic Meanings
Ian Molloy, Hong Chen, Tiancheng Li, Qihua Wang,
Ninghui Li, Elisa Bertino (Purdue University)
Seraphin Calo and Jorge Lobo (IBM T.J. Watson
Research Center)
|
|
Lunch |
12:00 – 1:30 |
Session
3: Workflow Systems
Session chair: David Eyers
|
1:30 – 3:00 |
Delegation and Satisfiability in Workflow Systems
Jason Crampton and Hemanth Khambhammettu (Royal
Holloway, University of London)
|
|
Enforcing Security Properties in Task-based Systems
Keith Irwin (North Carolina State University)
William Winsborough (University of Texas at San Antonio)
Ting Yu (North Carolina State University)
|
|
Task-Based Entailment Constraints For Basic Workflow Patterns
Christian Wolter (SAP Research)
Andreas Schaad (SAP AG)
Christoph Meinel (Hasso-Plattner-Institut)
|
|
Coffee Break |
3:00 – 3:30 |
Session
4: Panel on Role Engineering
Session chair: Vijay Atluri
|
3:30 – 5:00 |
Conferencee Banquet
|
7:00 – 10:00 |
June 12, 2008
|
Session
5: Role Based Access Control
Session chair: Elisa Bertino
|
8:30 – 10:00 |
Authorization Recycling in RBAC Systems
Qiang Wei (University of British Columbia)
Jason Crampton (Royal Holloway, University
of London)
Konstantin Beznosov, Matei Ripeanu (University of British Columbia)
|
|
ROWLBAC - Representing Role Based Access Control in OWL
Tim Finin, Anupam Joshi (University of
Maryland Baltimore County)
Lalana Kagal (Massachusetts Institute of Technology)
Jianwei Niu, Ravi Sandhu (University of Texas at San Antonio)
Bhavani Thuraisingham (University of Texas at
Dallas)
William Winsborough (University of Texas at San Antonio)
|
|
A Framework for User Authorization Query Processing in RBAC extended
with Hybrid Hierarchy and Constraints
Yue Zhang and James Joshi (University
of Pittsburgh)
|
|
Coffee Break |
10:00 – 10:30 |
Session
6: Access Control in Distributed Environments
Session chair: Dongwan Shin
|
10:30 – 12:00 |
RBAC Administration in Distributed Systems
Marnix Dekker (University of Twente)
Jason Crampton (Royal Holloway, University of London)
Sandro Etalle (University of Twente)
|
|
Policy Decomposition for Collaborative Access Control
Dan Lin, Prathima Rao, Elisa Bertino, Ninghui
Li (Purdue University)
Jorge Lobo (IBM T.J. Watson Research Center)
|
|
Context-Aware Role-based Access Control in Pervasive Computing
Systems
Devdatta Kulkarni and Anand Tripathi (University
of Minnesota)
|
|
Lunch |
12:00 – 1:30 |
Session
7: Obligations
Session chair: Gail-Joon Ahn
|
1:30 – 3:00 |
Beyond UCON Core Models with General Obligation Model and Continuity-Enhanced
Policy Enforcement Engine
Basel Katt (Innsbruck University)
Xinwen Zhang (Samsung Information Systems America)
Ruth Breu, Michael Hafner (Innsbruck University)
Jean-Pierre Seifert (Samsung Information Systems America)
|
|
An Obligation Model Bridging Access Control Policies and Privacy
Policies
Qun Ni, Elisa Bertino (Purdue University)
Jorge Lobo (IBM T.J. Watson Research Center)
|
|
Access Control by Action Control
Steve Barker (King's College, London University)
|
|
Coffee Break
|
3:00 – 3:30 |
Session
8: Panel on Meta Models for Access Control
Session Chair: James Joshi
|
3:30 – 5:00 |
June 13, 2008
|
Administrative Remarks |
8:45– 9:00 |
Session
9: Access Control in Systems
Session chair: Lujo Bauer
|
9:00 – 10:30 |
Measuring Integrity on Mobile Phone Systems
Divya Muthukumaran, Anuj Sawani, Joshua Schiffman
(The Pennsylvania State University)
Brian M. Jung (Samsung Electronics Co., Ltd.)
Trent Jaeger (The Pennsylvania State University)
|
|
Visualization Based Policy Analysis: Case Study in SELinux
Wenjuan Xu, Mohamed Shehab and Gail-Joon Ahn
(University of North Carolina at Charlotte)
|
|
Model based behavioral Attestation
Masoom Alam (Institute of Management Sciences,
Pakistan)
Xinwen Zhang (Samsung Information Systems America)
Mohammad Nauman, Tamleek Tanveer (Institute of Management Sciences,
Pakistan)
Jean-Pierre Seifert (Samsung Information Systems America)
|
|
Coffee Break
|
10:30 – 11:00 |
Session
10: Policy Analysis
Session Chair: Jason Crampton
|
11:00 – 12:00 |
Detecting and Resolving Policy Misconfigurations in Access-Control
Systems
Scott Garriss, Lujo Bauer (Carnegie Mellon
University)
Michael K. Reiter (University of North Carolina at
Chapel Hill)
|
|
Enabling verification and conformance testing for access control
model
Hongxin Hu and Gail-Joon Ahn (University
of North Carolina at Charlotte)
|
|
Lunch |
12:00 – 1:30 |