Date |
Event |
Time |
June 9, 2010 |
Registration (2nd Floor Foyer) |
07:00 – |
Full Breakfast (Symphony AB) |
07:00 – 08:20 |
Welcome Remarks (Jimmy Stewart Room) |
08:30 – 09:00 |
Keynote Address (Jimmy Stewart Room)
Title: New Access Models for Healthcare
Tyrone W. Grandison - IBM Almaden, USA
|
09:00 – 10:00 |
Coffee Break (2nd Floor Foyer) |
10:00 – 10:30 |
Session 1: Policy Analysis (Jimmy Stewart Room)
Session chair: Mahesh V. Tripunitara (University of Waterloo, Canada)
|
10:30 – 12:00 |
A Model of Triangulating Environments for Policy Authoring
Kathi Fisler (WPI, USA)
Shriram Krishnamurthi (Brown University, USA)
|
|
Towards Analyzing Complex Operating System Access Control Configurations
Hong Chen (Purdue University, USA)
Ninghui Li (Purdue University, USA)
Christopher S. Gates (Purdue University, USA)
Ziqing Mao (Purdue University, USA)
|
|
Monitoring Security Policies with Metric First-order Temporal Logic
David Basin (ETH Zurich, Switzerland)
Felix Klaedtke (ETH Zurich, Switzerland)
Samuel Muller (ETH Zurich, Switzerland)
|
|
Lunch (Symphony AB) |
12:00 – 13:30 |
Session
2: Role Engineering (Jimmy Stewart Room)
Session chair: Axel Kern (Beta Systems Software AG) |
13:30 – 15:30 |
On the Definition of Role Mining
Mario Frank (ETH Zurich, Switzerland)
Joachim M. Buhmann (ETH Zurich, Switzerland)
David Basin (ETH Zurich, Switzerland)
|
|
Mining Roles with Noisy Data
Ian Molloy (Purdue University, USA)
Ninghui Li (Purdue University, USA)
Jorge Lobo (IBM Research T.J. Watson, USA)
Yuan (Alan) Qi (Purdue University, USA)
Luke Dickens (Imperial College, UK)
|
|
StateMiner: An Efficient Similarity-Based Approach for Optimal Mining of Role Hierarchy
Hassan Takabi (University of Pittsburgh, USA)
James Joshi (University of Pittsburgh, USA)
|
|
Role Mining Based on Weights
Xiaopu Ma (Huazhong University of Science and Technology, China)
Ruixuan Li (Huazhong University of Science and Technology, China)
Zhengding Lu (Huazhong University of Science and Technology, China)
|
|
Coffee Break (2nd Floor Foyer) |
15:30 – 16:00 |
Panel I (Jimmy Stewart Room)
Access Control in Practice: Pain Points
Panel Moderator:
Mahesh V. Tripunitara, University of Waterloo, Canada
Panelists:
Praerit Garg, Symform Inc.
Bob Bocchino, Oracle Corp.
Fred Frye, Integrated Biometrics
Divya Sundaram, Motorola Inc.
|
16:00 – 17:30 |
Dine-Arounds at various local restaurants (within walking distance) |
18:30 – 20:30 |
Dessert Reception (Symphony AB) |
21:00 – 23:00 |
June 10, 2010
|
Registration (2nd Floor Foyer) |
07:00 – |
Full Breakfast (Symphony AB) |
07:00 – 08:20 |
Keynote Address (Jimmy Stewart Room)
Title: Automated Management of Network Access Control from Design to Enforcement
Ehab Al-Shaer - University of North Carolina Charlotte, USA
|
08:30 – 09:30 |
Coffee Break (Symphony AB) |
09:30 – 10:00 |
Session
3: Role Based Access Control (Jimmy Stewart Room)
Session chair: Gail-Joon Ahn (Arizona State University, USA) |
10:00 – 12:00 |
Role-Based Access Control (RBAC) in Java via Proxy Objects using Annotations
Jeff Zarnett (University of Waterloo, Canada)
Mahesh Tripunitara (University of Waterloo, Canada)
Patrick Lam (University of Waterloo, Canada)
|
|
Role Updating for Assignments
Jinwei Hu (Huazhong University of Science and Technology, China)
Yan Zhang (University of Western Sydney, Australia)
Ruixuan Li (Huazhong University of Science and Technology, China)
Zhengding Lu (Huazhong University of Science and Technology, China)
|
|
Enforcing Spatial Constraints for Mobile RBAC Systems
Michael Kirkpatrick (Purdue University, USA)
Elisa Bertino (Purdue University, USA)
|
|
Capability-Based Delegation Model in RBAC
Koji Hasebe (University of Tsukuba, Japan)
Mitsuhiro Mabuchi (University of Tsukuba, Japan)
Akira Matsushita (University of Tsukuba, Japan)
|
|
Lunch (Symphony AB) |
12:00 – 13:30 |
Session
4: Privacy Preserving Access Control (Jimmy Stewart Room)
Session chair: Adam J. Lee (University of Pittsburgh, USA) |
13:30 – 15:30 |
CARL: A Language Enabling Privacy-Preserving Access Control
Franz-Stefan Preiss (IBM Research Zurich, Switzerland)
Jan Camenisch (IBM Research Zurich, Switzerland)
Sebastian Modersheim (IBM Research Zurich, Switzerland)
Gregory Neven (IBM Research Zurich, Switzerland)
Dieter Sommer (IBM Research Zurich, Switzerland)
|
|
Modular Context-Aware Access Control for Medical Sensor Networks
Oscar Garcia Morchon (Philips Research Europe, Germany)
Klaus Wehrle (RWTH-Aachen University, Germany)
|
|
Privacy-preserving Trust Verification
Jaideep Vaidya (Rutgers University, USA)
Vijay Atluri (Rutgers University, USA)
Basit Shafiq (Rutgers University, USA)
Nabil Adam (Rutgers University, USA)
| |
Personalizing Access Control by Generalizing Access Control
Steve Barker (King's College, London University, UK) | |
Coffee Break (2nd Floor Foyer) |
15:30 – 16:00 |
Panel II (Jimmy Stewart Room)
Solving the Access-Control Puzzle: Finding the Pieces and Putting Them Together(pdf)
Panel Moderator:
Lujo Bauer, Carnegie Mellon University, USA
Adam J. Lee, University of Pittsburgh, USA
Panelists:
Lorrie Cranor, Carnegie Mellon University
Carl Gunter, University of Illinois at Urbana Champain
Mike Reiter, University of North Carolina at Chapel Hill
Ravi Sandhu, University of Texas at San Antonio
|
16:00 – 17:30 |
SACMAT Banquet at LeMont Restaurant in Mount Washington (departure from Hotel) |
18:00 – |
June 11, 2010
|
Registration (2nd Floor Foyer) |
07:00 – |
Full Breakfast (Rhapsody Ballroom) |
07:00 – 08:20 |
Keynote Address (Jimmy Stewart Room)
Title: Architectures for Practical Security
Virgil D. Gligor - Carnegie Mellon University, USA
|
08:30 – 09:30 |
Coffee Break (2nd Floor Foyer) |
09:30 – 10:00 |
Session
5: Access Control in Distributed Environments (Jimmy Stewart Room)
Session chair: Jaideep Vaidya (Rutgers University, USA)
|
10:00 – 12:00 |
An Architecture for Enforcing End-to-End Access Control Over Web Applications
Sandra Rueda (Pennsylvania State University, USA)
Boniface Hicks (Saint Vincent College, USA)
Yogesh Sreenivasan (Pennsylvania State University, USA)
Dave King (Pennsylvania State University, USA)
Joshua Schiffman (Pennsylvania State University, USA)
Thomas Moyer (Pennsylvania State University, USA)
Trent Jaeger (Pennsylvania State University, USA)
Patrick McDaniel (Pennsylvania State University, USA)
|
|
Access Control Policy Translation and Verification within Heterogeneous Data Federations
Greg Leighton (University of Alberta, Canada)
Denilson Barbosa (University of Alberta, Canada)
|
|
Data Protection Models for Service Provisioning in the Cloud
Dan Lin (Missouri University of Science and Technology, USA)
Anna Squicciarini (Pennsylvania State University, USA)
|
|
An Access Control Model for Mobile Physical Objects
Florian Kerschbaum (SAP Research, Germany) |
|
Closing Remarks |
12:00 – 12:15 |
Lunch (Rhapsody Ballroom) |
12:15 – 13:45 |