|
-- ACM OpenTOC to download SACMAT'16 papers --
Date |
Start |
End |
Event |
|
6-Jun |
9:00 |
9:10 |
Openning Remarks |
|
|
9:10 |
10:10 |
Keynote Talk: Dr.
Virgil Gligor |
Title: Establishing and Maintaining Root of Trust on Commodity Computer Systems |
|
10:10 |
10:40 |
Coffee Break |
|
|
10:40 |
12:20 |
Session 1:Network and
Mobile Access Control
Chair: Axel Kern |
Wonkyu
Han, Hongxin Hu, Ziming Zhao, Adam DoupÈ, Gail-Joon Ahn, Kuang-Ching Wang and
Juan Deng. State-aware Network Access Management for Software-Defined
Networks
Minyue Ni, Yang Zhang, Weili Han and Jun Pang. An Empirical Study on User
Access Control in Online Social Networks
Oyindamola Oluwatimi and Elisa Bertino. An Application Restriction System
for Bring-Your-Own-Device Scenarios
Haining Chen, Omar Chowdhury, Ninghui Li, Warut Khern-Am-Nuai, Suresh Chari,
Ian Molloy and Youngja Park. Tri-Modularization of Firewall Policies |
|
12:20 |
1:30 |
Lunch (provided by conference) |
|
|
1:30 |
3:00 |
Panel:
Security and Privacy in the Age of Internet of Things: Opportunities and
Challenges |
Panel
moderator: Jianwei Niu
Panelists: Yier Jin, Adam J. Lee, Ravi Sandhu, Wenyuan Xu, Xiaoguang Zhang |
|
3:00 |
3:30 |
Coffee Break |
|
|
3:30 |
5:10 |
Session 2: Access
Control in Applications
Chair: XiaoFeng Wang |
Hitesh
Padekar, Younghee Park, Hongxin Hu and Sang-Yoon Chang. Enabling Dynamic
Access Control for Controller Applications in Software-Defined Networks
Oyindamola Oluwatimi, Daniele Midi and Elisa Bertino. A Context-Aware System
to Secure Enterprise Content
(Short) Jun Zhu, Bill Chu and Heather Lipford. Detecting Privilege
Escalation Attacks through Instrumenting Web Application Source Code
(Short) Thomas Pasquier, Jean Bacon, David Eyers and Jatinder Singh. Data-Centric
Access Control for Cloud Computing
Daniel Ricardo Dos Santos, Serena Elisa Ponta and Silvio Ranise. Modular
Synthesis of Enforcement Mechanisms for the Workflow Satisfiability Problem:
Scalability and Reusability |
|
6:00 |
8:00 |
Reception &
Posters |
|
|
|
|
|
|
7-Jun |
9:00 |
10:00 |
Keynote Talk: Dr. Bhavani Thuraisingham |
Title: Cloud-centric Assured Information Sharing |
|
10:00 |
10:30 |
Coffee Break |
|
|
10:00 |
11:30 |
Poster Session |
Chairs: Adam Lee and Bill Garrison
Can Wang, Gang Liu, Runnan Zhang, Jinhui Liu, Huimin Song, Shaomin Ji. BTG-BIBA: BIBA Model with a Break the Glass Strategies
Huimin Song, Gang Liu, Runnan Zhang, Quan Wang, Can Wang, Guofang Zhang. Hierarchical-System-Based Access Control(HSAC) Model
Luca Compagna, Daniel R. dos Santos, Serena E. Ponta, Silvio Ranise. Cerberus - Automated Synthesis of Enforcement Mechanisms for Security-sensitive Business Processes
Ameni Ben Fadhel. Model-driven Specification and Run-time Verification for Role-based Access Control Policies
Claiborne Johnson, Tom MacGahan, John Heaps, Armando L. Rodriguez, Jeffery von Ronne, Jianwei Niu. Assume-Guarantee Specification of an Actor-Component Architecture
Oyindamola Oluwatimi, Daniele Midi, Elisa Bertino. Application-Level Anonymity with IdentiDroid
Jason Crampton, Gregory Gutin, Daniel Karapetyan, Remi Watrigant. The Bi-objective Workflow Satisfiability Problem
Jing Chen, Christopher Gates, Ninghui Li, Robert W. Proctor. Effective Risk Communication for Android Apps: Influence of Risk/Safety Information Framing
Wonkyu Han, Hongxin Hu, Gail-Joon Ahn, and Ziming Zhao. Building Robust Firewalls for Software-Defined Networks
|
|
11:30 |
13:30 |
Lunch (provided by
conference) |
|
|
13:30 |
15:10 |
Session 3: Policy
Engineering
Chair: Weili Han |
Jason
Crampton, Gregory Gutin and RÈmi Watrigant. Resiliency Policies in Access
Control Revisited
Aaron Elliott and Scott Knight. Start Here: Engineering Scalable Access
Control Systems
Pooya Mehregan and Philip W. L. Fong. Policy
Negotiation for Co-owned Resources in Relationship-Based Access Control
Dianxiang Xu, Zhenyu Wang, Shuai Peng and Ning Shen. Automated Fault
Localization of XACML Policies |
|
15:10 |
15:40 |
Coffee Break |
|
|
15:40 |
17:20 |
Session 4: Access
Control Specification
Chair: Sherman Chow |
Jason
Crampton and Conrad Williams. On Completeness in Languages for
Attribute-based Access Control
Yuan Cheng, Khalid Bijon and Ravi Sandhu. Extended ReBAC Administrative
Models to Express Multi-Tenant RBAC Policies
(Short) Marc
Hüffmeyer and Ulf Schreier. Formal Comparison of an Attribute Based Access
Control Language for RESTful Services with XACML
Ameni Ben Fadhel, Domenico Bianculli and Lionel Briand. GemRBAC-DSL: a
High-level Specification Language for Role-based Access Control Policies |
|
18:00 |
20:00 |
Banquet (off-site
venue, TBA) |
|
|
|
|
|
|
8-Jun |
9:00 |
10:00 |
Keynote Talk: Dr. Robert
Deng |
Title: Achieving End-to-End Security in Mobile Computing |
|
10:00 |
10:30 |
Coffee Break |
|
|
10:30 |
12:05 |
Session 5: Access
Control Enforcement
Chair: Philip Fong |
Zhiping
Wu and Frank Tompa. A Space-Efficient Data Structure for Fast Access Control
in ECM Systems
Julien Bringer, HervÈ Chabanne, Othmane El Omri and Constance Morel.
Boosting GSHADE Capabilities: New Applications and Security in Malicious
Setting
Sherman S. M. Chow. A Framework of Multi-Authority Attribute-Based
Encryption with Outsourcing and Revocation
Cory Thoma, Adam J. Lee and Alexandros Labrinidis. PolyStream:
Cryptographically Enforced Access Controls for Outsourced Data Stream
Processing |
|
12:05 |
12:10 |
End Remarks by the
Organizers |
|
|