Date |
Event |
Time |
June 25, 2014 |
Registration |
08:00 – |
Continental Breakfast (Atrium, Physics and Astronomy Building) |
08:00 – 09:00 |
Opening Remarks |
08:45 – 09:00 |
Keynote Session (Session Chair: Ian M. Molloy, IBM-Watson)
Title: A Bodyguard of Lies: The Use of Honey Objects in Information Security
Dr. Ari Juels - Cornell Tech, NYC, USA
|
09:00 – 10:00 |
Coffee Break |
10:00 – 10:30 |
Session 1
Session chair: Florian Kerschbaum, SAP
|
10:30 – 12:00 |
Hardware-Enhanced Distributed Access Enforcement for Role-Based Access Control
Gedare Bloom and Rahul Simha (Computer Science Department, The George Washington University) |
|
An Access Control Concept for Novel Automotive HMI Systems
Simon Gansel (Daimler AG), Stephan Schnitzer (University of Stuttgart), Ahmad Gilbeau-Hammoud, Viktor Friesen (Daimler AG), Frank Dürr, Kurt Rothermel (University of Stuttgart) and Christian Maihöfer (Daimler AG) |
|
Monitor Placement for Large-Scale Systems
Nirupama Talele, Jason Teutsch (Penn State University), Robert Erbacher (Utah State University) and Trent Jaeger (Penn State University) |
|
Lunch (Atrium, Physics and Astronomy Building) |
12:00 – 13:30 |
Session
2
Session chair: Philip Fong, University of Calgary |
13:30 – 15:00 |
Anomaly Detection and Visualization in Generative RBAC Models
Maria Leitner and Stefanie Rinderle-Ma (University of Vienna) |
|
Reduction of Access Control Decisions
Charles Morisset (Newcastle University) and Nicola Zannone (Eindhoven University of Technology) |
|
Sorting Out Role Based Access Control
Wouter Kuijper and Victor Ermolaev (Nedap N.V., Netherlands) |
|
Coffee Break |
15:00 – 15:30 |
Session
3
Session chair: Adam Lee, University of Pittsburgh |
15:30 – 17:00 |
Towards More Usable Information Flow Policies for Contemporary Operating Systems
Wai Kit Sze, Bhuvan Mital and R. Sekar (Stony Brook University) |
|
Attribute Based Access Control for APIs in Spring Security (Demo)
Alessandro Armando (DIBRIS - University of Genova), Roberto Carbone, Eyasu Getahun Chekole (Security & Trust Unit, FBK) and Silvio Ranise (FBK-Irst) |
|
Comprehensive Integrity Protection for Desktop Linux (Demo)
Wai Kit Sze and R. Sekar (Stony Brook University) |
|
June 26, 2014
|
Registration |
08:00 – |
Continental Breakfast (Atrium, Physics and Astronomy Building) |
08:00 – 09:00 |
Session
4
Session chair: Nicola Zannone, Eindhoven University of Technology |
9:00 – 10:30 |
Game Theoretic Analysis of Multiparty Access Control in Online Social Networks
Hongxin Hu (Delaware State University), Gail-Joon Ahn, Ziming Zhao (Arizona State University) and Dejun Yang (Colorado School of Mines) |
|
Scalable and Precise Automated Analysis of Administrative Temporal Role-Based Access Control
Silvio Ranise (Security & Trust, FBK-Irst, Trento, Italia), Anh Truong (University of Trento and Security & Trust, FBK-Irst, Trento, Italia) and Alessandro Armando (Security &Trust, FBK-Irst, Trento, Italia and DIBRIS, University of Genova, Italia) |
|
Access Control Models for Geo-Social Computing Systems
Ebrahim Tarameshloo and Philip W. L. Fong (University of Calgary) |
|
Coffee Break |
10:30 – 11:00 |
Panel Session (Session Chair: Lujo Bauer, Carnegie Mellon University, and Florian Kerschbaum, SAP AG)
Title: What are the Most Important Challenges for Access Control in New Computing Domains, such as Mobile, Cloud and Cyber-physical Systems?
Panelists:
- Tamara Denning (University of Washington)
- Trent Jaeger (Pennsylvania State University)
- Adam Lee (University of Pittsburgh)
- Ravi Sandhu (University of Texas San Antonio)
|
11:00 – 12:00 |
Lunch (Atrium, Physics and Astronomy Building) |
12:00 – 13:30 |
Session
5
Session chair: Jianwei Niu, University of Texas at San Antonio |
13:30 – 15:00 |
Limiting Access to Unintentionally Leaked Sensitive Documents Using Malware Signatures
Mordechai Guri, Gabi Kedma, Buky Carmeli and Yuval Elovici (Ben-Gurion University) |
|
Optimized and Controlled Provisioning of Encrypted Outsourced Data
Anis Bkakria (Telecom Bretagne Rennes), Andreas Schaad, Florian Kerschbaum (SAP AG), Frederic Cuppens, Nora Cuppens-Boulahia (Telecom Bretagne Rennes) and David Gross-Amblard (Universite de Rennes 1 - IRISA) |
|
User-Centric Identity as a Service-Architecture for eIDs with Selective Attribute Disclosure
Daniel Slamanig (Graz University of Technology - IAIK), Klaus Stranacher and Bernd Zwattendorfer (EGIZ) |
|
Coffee Break |
15:00 – 15:30 |
Session
6
Session chair: Axel Kern, Beta Systems Software AG |
15:30 – 17:00 |
Towards Fine Grained RDF Access Control
Jyothsna Rachapalli, Vaibhav Khadilkar, Murat Kantarcioglu and Bhavani Thuraisingham (The University Of Texas Dallas) |
|
Redaction based RDF Access Control Language (Demo)
Jyothsna Rachapalli, Vaibhav Khadilkar, Murat Kantarcioglu and Bhavani Thuraisingham (The University Of Texas Dallas) |
|
A System for Risk Awareness During Role Mining (Demo)
Sharmin Ahmed and Sylvia Osborn (University of Western Ontario) |
|
Banquet (Bus pickup at 5:15 from conference location) |
17:15 – |
June 27, 2014
|
Registration |
08:00 – |
Continental Breakfast (Atrium, Physics and Astronomy Building) |
08:00 – 09:00 |
Keynote Session (Session Chair: Mahesh Tripunitara, University of Waterloo)
Title: Re-thinking Networked Privacy, Security, Identity and Access control in Our Surveillance States
Dr. Andrew Clement - University of Toronto, Canada
|
09:00 – 10:00 |
Coffee Break |
10:00 – 10:30 |
Session
7
Session chair: Silvio Ranise, FBK-irst |
10:30 – 12:00 |
Path Conditions and Principal Matching: A New Approach to Access Control
Jason Crampton and James Sellwood (Royal Holloway, University of London) |
|
An Actor-Based, Application-Aware Access Control Evaluation Framework
William C. Garrison III, Adam J. Lee (University of Pittsburgh) and Timothy Hinrichs (VMware, Inc.) |
|
Policy Models to Protect Resource Retrieval
Hayawardh Vijayakumar, Xinyang Ge and Trent Jaeger (Penn State University) |
|
Closing Remarks |
12:00 – 12:05 |