|
SACMAT 09
Date |
Event |
Time |
June 3, 2009 |
Registration/Coffee Break |
08:00 – 08:45 |
Welcome |
08:45 – 09:00 |
Session 1: Keynote Address
Title: Challenges and Opportunities for Virtualized Security in the Clouds
Frank Siebenlist, Argonne National Laboratory, USA
|
09:00– 10:00 |
Coffee Break |
10:00 – 10:30 |
Session 2: Security Analysis and Verification
Session chair: Mahesh V. Tripunitara (University of Waterloo, Canada)
|
10:30 – 12:30 |
Safety in Discretionary Access Control for Logic-based Publish-subscribe Systems
Kazuhiro Minami, Nikita Borisov, Carl Gunter
University of Illinois at Urbana Champaign, USA |
|
Ensuring Spatio-Temporal Access Control for Real-World Applications
Manachai Toahchoodee, Indrakshi Ray, Kyriakos Anastasakis, Geri Georg, Behzad Bordbar
Colorado State University, USA |
|
An Efficient Framework for User Authorization Query in RBAC Systems
Guneshi Wickramaarachchi, Wahbeh Qardaji , Ninghui Li
Purdue University, USA |
|
Towards Formal Security Analysis of GTRBAC using Timed Automata
Samrat Mondal, Shamik Sural, Indian Institute of Technology - Kharagpur, India
Vijayalakshmi Atluri, Rutgers University, USA |
|
Lunch |
12:30 – 02:00 |
Session
3: Multidomain Policy Integration
Session chair: Adam J. Lee (University of Pittsburgh, USA) |
02:00 – 03:30 |
xDomain: Cross-border Proofs of Access
Lujo Bauer, Carnegie Mellon University, USA
Limin Jia, University of Pennsylvania, USA
Mike Reiter, University of North Carolina at Chapel Hill, USA
David Swasey, Carnegie Mellon University, USA
|
|
Dynamic Mandatory Access Control for Multiple Stakeholders
Vikhyath Rao, Trent Jaeger, Pennsylvania State University, USA |
|
An Algebra for Fine-Grained Integration of XACML Policies
Prathima Rao, Purdue University, USA
Dan Lin, Missouri University of Science and Technology, USA
Elisa Bertino, Ninghui Li, Purdue University, USA
Jorge Lobo, IBM T. J. Watson Research Center, USA
|
|
Coffee Break |
03:30 – 04:00 |
Session
4: Panel I
Usability Meets Access Control:Challenges and Research Opportunities (pdf)
Panel Moderator:
Konstantin Beznosov, University of British Columbia, Canada
Panelists:
Philip Inglesant, University College London, UK
Jorge Lobo, IBM T. J. Watson Research Center, USA
Rob Reeder, Microsoft Research, USA
Mary Ellen Zurko, IBM LotusLive Security Architecture and Strategy, USA
|
04:00 – 05:30 |
June 4, 2009
|
Session
5: Role Engineering
Session chair: Vijay Atluri (Rutgers University, USA) |
08:30 – 10:00 |
Automating Role-based Provisioning by Learning from Examples
Qun Ni, Purdue University, USA
Jorge Lobo, Seraphin Calo, Pankaj Rohatgi, IBM T. J. Watson Research Center, USA
Elisa Bertino, Purdue University, USA
|
|
A Formal Framework to Elicit Roles with Business Meaning in RBAC Systems
Alessandro Colantonio, Alberto Ocello, Engiweb Security, Italy
Roberto Di Pietro, Nino Vincenzo Verde, Universita di Roma Tre, Italy
| |
Evaluating Role Mining Algorithms
Ian Molloy, Ninghui Li, Tiancheng Li, Ziqing Mao Qihua Wang
Purdue University, USA
|
|
Coffee Break |
10:00 – 10:30 |
Session
6: Secure Sharing and Policy Combination
Session chair: Elena Ferrari (University of Insubria, Italy) |
10:30 – 12:30 |
A Decision Support System for Secure Information Sharing
Achille Fokoue, Mudhakar Srivatsa, Pankaj Rohatgi, IBM T.J. Watson Research Center, USA
Peter Wrobel, CESG, UK
John Yesberg, DSTL, UK
|
|
Formal Models for Group-Centric Secure Information Sharing
Ram Krishnan, George Mason University, USA
Ravi Sandhu, Jianwei Niu,William Winsborough, University of Texas at San Antonio, USA
|
|
Patient-centric Authorization Framework for Sharing Electronic Health Records
Jing Jin, University of North Carolina at Charlotte, USA
Gail-Joon Ahn, Hongxin Hu, Arizona State University, USA
Michael Covington, Intel Corporation, USA
Xinwen Zhang, Samsung Information Systems, USA
|
|
Access Control Policy Combination: Theory Meets Practice
Ninghui Li, Qihua Wang, Wahbeh Qardaji, Elisa Bertino, Prathima Rao,
Purdue University, USA
Jorge Lobo, IBM T. J. Watson Research Center, USA
Dan Lin, Missouri University of Science and Technology, USA
|
|
Lunch |
12:30 – 02:00 |
Session
7: XACML and RBAC
Session chair: Lujo Bauer (Carnegie Mellon University, USA) |
02:00 – 03:30 |
Supporting RBAC with XACML + OWL
Rodolfo Ferrini, Elisa Bertino, Purdue University, USA |
|
Efficient Access Enforcement in Distributed Role-Based Access Control (RBAC) Deployments
Mahesh Tripunitara, University of Waterloo, Cananda
Bogdan Carbunar, Motorola Inc., USA
|
|
Symbolic Policy Analysis for Parameterized Administrative Role Based Access Control
Scott Stoller, Stony Brook University, USA
Ping Yang, Mikhail I. Gofman, Binghampton University, USA
C. R. Ramakrishnan, Stony Brook University, USA
| |
Coffee Break |
03:30 – 04:00 |
Session
8: Panel II
Spatio-Temporal Access Control: Challenges and Applications(pdf)
Panel Moderator:
Maria Luisa Damiani, University of Milan, Italy
Panelists:
Herve Martin, University of Grenoble, France
Yucel Saygin, Sabanci University, Turkey
Maria Rita Spada, Wind Telecomunicazioni, Italy
Cedric Ulmer, SAP Labs, Sophia Antipolis, France
|
04:00 – 05:30 |
Conference Banquet |
07:00-10:00 |
June 5, 2009
|
Session
9: Model/Meta-model and Extensions
Session chair: Jason Crampton (Royal Holloway, University of London, UK)
|
08:30 – 10:00 |
A Semantic Web Based Framework for Social Network
Barbara Carminati, Elena Ferrari, University of Insubria, Italy
Raymond Heatherly, Murat Kantarcioglu, Bhavani Thuraisingham, University of Texas at Dallas, USA
|
|
The Next 700 Access Control Models or a Unifying Meta-Model?
Steve Barker, King's College London, UK |
|
Extending Access Control Models with Break-glass
Achim D. Brucker, Helmut Petritsch, SAP Research |
|
Coffee Break
|
10:00 – 10:30 |
Session
10: Trust and Access Control in Systems
Session Chair: Indrakshi Ray (Colorado State University, USA) |
10:30 – 12:30 |
Working Set-Based Access Control for Network File Systems
Stephen Smaldone, Vinod Ganapathy, Liviu Iftode
Rutgers University, USA
|
|
Towards a Dynamic and Composite Model of Trust
Adam J. Lee, University of Pittsburgh, USA
Ting Yu, North Carolina State University, USA
|
|
Analysis of Virtual Machine System Policies
Sandra Rueda, Hayawardh Vijayakumar, Trent Jaeger, The Pennsylvania State University, USA
|
|
Trojan Horse Resistant Discretionay Access Control
Ziqing Mao, Ninghui Li, Hong Chenm, Purdue University, USA
Xuxian Jiang, North Carolina State University, USA
|
|
Wrap up and Adjourn |
12:30 – |
|