Date |
Event |
Time |
June 20, 2012 |
Registration |
08:00 – |
Breakfast |
08:00 – 09:00 |
Welcome |
09:00 – 09:30 |
Keynote Session (Session Chair: Vijay Atluri, Rutgers University, USA)
Title: Hardware-enhanced Access Control for Cloud Computing
Ruby Lee - Princeton University, USA
|
09:30 – 10:30 |
Coffee Break |
10:30 – 11:00 |
Session 1: Access Control for Mobile Devices and Social Networks
Session chair: Ian Molloy (IBM, USA)
|
11:00 – 12:30 |
MOSES: Supporting Operation Modes on Smartphones
Giovanni Russello, Mauro Conti, Bruno Crispo and Earlence Fernandes |
|
Android Permissions: A Perspective Combining Risks and Benefits
Bhaskar Sarma, Ninghui Li, Chris Gates, Rahul Potharaju, Cristina Nita-Rotaru, and Ian Molloy |
|
Policy-by-Example for Online Social Networks
Gorrell Cheek and Mohamed Shehab |
|
Lunch |
12:30 – 13:30 |
Session
2: Role Mining and User Obligations
Session chair: Ninghui Li (Purdue University, USA) |
13:30 – 15:00 |
Ensuring Authorization Requirements for Cascading User Obligations
Omar Chowdhury, Murillo Pontual, William Winsborough, Ting Yu, Keith Irwin, and Jianwei Niu |
|
Generative Models for Access Control Policies: Applications to Role Mining Over Logs with Attribution
Ian Molloy, Youngja Park, and Suresh Chari |
|
Algorithms for Mining Meaningful Roles
Zhongyuan Xu and Scott Stoller |
|
Coffee Break |
15:00 – 15:30 |
Panel (Session Chair: Rafae Bhatti, Accenture, USA)
Title: Emerging Trends around Big Data Analytics and Security
|
15:30 – 17:00 |
June 21, 2012
|
Registration |
08:00 – |
Breakfast |
08:00 – 09:00 |
Keynote Session (Session Chair: Axel Kern, Beta Systems Software AG, Germany)
Title: The Authorization Leap from Rights to Attributes: Maturation or Chaos
Ravi Sandhu - University of Texas at San Antonio, USA
|
09:00 – 10:00 |
Coffee Break |
10:00 – 10:30 |
Session
3: Access Control Applications
Session chair: Elisa Bertino (Purdue University, USA) |
10:30 – 12:30 |
SCUTA: A Server-Side Access Control System for Web Applications
Xi Tan, Wenliang Du, Tongbo Luo, and Karthick Soundararaj |
|
Graph-Based XACML Evaluation
Santiago Pina Ros, Mario Lischka, and Felix Gomez Marmol |
|
Optimal Workflow-aware Authorizations
David Basin, Samuel Burri, and Guenter Karjoth |
|
Access Control for RDF Graphs using Abstract Models
Vassilis Papakonstantinou, Maria Michou, Irini Fundulaki, Giorgos Flouris and Grigoris Antoniou |
|
Lunch |
12:30 – 13:30 |
Demo Session
Session chair: Andreas Schaad (SAP Labs, Germany) |
13:30 – 15:00 |
Coffee Break |
15:00 – 15:15 |
Session
4: Privacy
Session chair: Murat Kantarcioglu (University of Texas at Dallas, USA) |
15:15 – 16:45 |
Efficient Privacy Preserving Content Based Publish Subscribe Systems
Mohamed Nabeel and Elisa Bertino |
|
Fine Grained Access Control of Personal Data
Ting Wang and Mudhakar Srivatsa |
|
A Calculus for Privacy-friendly Authentication
Patrik Bichsel, Jan Camenisch, and Dieter Sommer |
|
Bus leaves for social event |
17:15 |
June 22, 2012
|
Registration |
08:00 – |
Breakfast |
08:00 – 09:00 |
Session
5: Access Control Policies
Session chair: James Joshi (University of Pittsburgh, USA) |
09:00 – 10:30 |
A Framework for Verification and Optimal Reconfiguration of Event-driven Role Based Access
Control Policies
Basit Shafiq, Jaideep Vaidya, Arif Ghafoor, and Elisa Bertino |
|
Model-Based Approach to Automated Testing of Access Control Policies
Dianxiang Xu, Lijo Thomas, Michael Kent, Tejeddine Mouelhi, and Yves Le Traon |
|
PLexC: A Policy Language for Exposure Control
Yann Le Gall, Adam Lee, and Apu Kapadia |
|
Coffee Break |
10:30 – 11:00 |
Session
6: Role-Based Access Control
Session chair: |
11:00 – 12:30 |
A Trust-and-Risk Aware RBAC Framework: Tackling Insider Threat
Nathalie Baracaldo and James Joshi |
|
Analyzing Temporal Role Based Access Control Models
Emre Uzun, Vijayalakshmi Atluri, Shamik Sural, Jaideep Vaidya, Madhusudan Parthasarathy, Gennaro Parlato, and Anna Lisa Ferrara |
|
A Framework Integrating Attribute-based Policies into RBAC
Jingwei Huang, David Nicol, Rakesh Bobba, and Jun Ho Huh |
|
Box Lunch |
12:30 – 14:00 |