09:00 - 10:00 |
Keynote II (Chair: Adam J. Lee,
University of Pittsburgh, USA)
- Trent Jaeger: Challenges in Making Access Control Sensitive to the "Right" Contexts
|
10:00 - 10:30 |
Coffee Break |
10:30 - 12:00 |
Session 4: Access Management
(Session Chair: Axel Kern, Beta Systems Software AG) |
|
Relationship-Based Access Control
for an Open-Source Medical Records System
- Syed Zain Rizvi (University of Calgary); Philip W. L. Fong
(University of Calgary); Jason Crampton (Royal Holloway, University of
London); James Sellwood (Royal Holloway, University of London)
|
|
Federated Access Management for
Collaborative Network Environments: Framework and Case Study
- Carlos E. Rubio-Medrano (Arizona State University); Ziming Zhao
(Arizona State University); Adam Doupe (Arizona State University);
Gail-Joon Ahn (Arizona State University)
|
|
Fine-Grained Business Data
Confidentiality Control in Cross-Organizational Tracking
- Weili Han (Fudan University); Yin Zhang (Fudan University); Zeqing
Guo (Fudan University); Elisa Bertino (Purdue University)
|
12:00 - 13:30 |
Lunch |
13:30 - 15:30 |
Session 5: Demonstrations (Session
Chair: Andreas Schaad, HUAWEI European Research Center,
Germany) |
|
A Prototype to Reduce the Amount of Accessible Information
- Rainer Fischer (Hewlett Packard)
|
|
Relationship-Based Access Control
for an Open-Source Medical Records System
- Syed Zain Rizvi (University of Calgary); Philip W. L. Fong
(University of Calgary); Jason Crampton (Royal Holloway, University of
London); James Sellwood (Royal Holloway, University of London)
|
|
A SMT-based Tool for the Analysis and Enforcement of NATO Content-based Protection and Release Policies
- Alessandro Armando (DIBRIS - University of Genova); Silvio Ranise
(FBK-Irst); Riccardo Traverso (FBK (Fondazione Bruno Kessler)); Konrad
Wrona (NCI Agency)
|
|
Towards a General Framework for Optimal Role Mining: A Constraint Satisfaction Approach
- Hassan Takabi (University of North Texas); Masoud Narouei
(University of North Texas)
|
|
Hard Instances for Verification
Problems in Access Control
- Nima Mousavi (Google); Mahesh Tripunitara (The University of
Waterloo)
|
|
Initial encryption of large
searchable data sets using Hadoop
- Feng Wang (SAP SE); Mathias Kohler (SAP SE); Andreas Schaad (SAP
SE)
|
|
Generating Secure Images for
CAPTCHAs through Noise Addition
- David Lorenzi (Rutgers University); Pratik Chattopadhyay (IIT
Kharagpur); Emre Uzun (Rutgers University); Jaideep Vaidya (Rutgers
University); Shamik Sural (IIT Kharagpur); Vijayalakshmi Atluri
(Rutgers University)
|
15:30 - 16:00 |
Coffee Break |
16:00 - 17:00 |
Session 6: Trust and Applications
(Session Chair: Anna Squicciarini, Pennsylvania State University) |
|
A Logic of Trust for Reasoning About
Delegation And Revocation
- Marcos Cramer (University of Luxembourg); Agustin Ambrossio
(University of Luxembourg)
|
|
Towards Attribute-Based
Authorisation for Bidirectional Programming
- Lionel Montrieux (NII); Zhenjiang Hu (NII)
|
17:15 |
Transport to Dinner Location |
18:00 |
Conference Dinner on a private
vineyard with a view over Vienna and its surroundings |