Date |
Start |
End |
Event |
|
21-Jun |
7:30 |
8:30 |
Breakfast |
|
|
9:00 |
9:30 |
Conference
Opening |
Elisa Bertino
(General Chair) |
|
|
|
Program
Introduction |
Sandhu and Weippl
(Program co-Chairs) |
|
9:30 |
10:30 |
Keynote
Talk I (Ravi Sandhu): Distributed Intelligence - Trends in the Management of Complex Systems |
Dr. Seraphin Calo
(IBM Research) |
|
10:30 |
0:00 |
Coffee
Break |
|
|
11:00 |
12:30 |
Session
I (Elena Ferrari): Authorization and Authentication |
A Flexible Authorization Architecture for Systems of
Interoperable Medical Devices. Qais Tasali,
Chandan Chowdhury and Eugene Vasserman.
Uncoupling Biometrics from Templates for Secure and
Privacy-Preserving Authentication. Aysajan Abidin, Enrique Argones Rúa and Roel Peeters
On
Risk in Access Control Enforcement. Giuseppe Petracca, Frank Capobianco,
Christian Skalka and Trent Jaeger |
|
12:30 |
1:30 |
Lunch |
|
|
1:30 |
3:00 |
Session
II (Axel Kern): Applications |
FACT: Functionality-centric Access Control System for IoT
Programming Frameworks. Sanghak Lee, Jiwon Choi,
Jihun Kim, Beumjin Cho, Sangho Lee, Hanjun Kim and Jong Kim
An Enforcement Model for Preventing Inference Attacks in Social
Computing Platforms. Seyed Hossein Ahmadinejad and
Philip W. L. Fong
Secure Pick Up
Implicit Authentication When You Start Using the Smartphone. Wei-Han Lee,
Xiaochen Liu, Yilin Shen, Hongxia Jin and Ruby Lee |
|
3:00 |
3:30 |
Coffee
Break |
|
|
3:30 |
5:00 |
Session
III (Hongxin Hu): Privacy Models and Frameworks |
Attribute Expressions Policy Tables and Attribute-Based Access
Control. Jason Crampton and Conrad Williams
A Datalog framework for modeling Relationship-based Access
Control Policies. Edelmira Pasarella and Jorge
Lobo
Towards a Top-down Policy
Engineering Framework for Attribute-based Access Control. Masoud Narouei,
Hamed Khanpour, Hassan Takabi, Rodney Nielsen and Natalie Parde |
|
7:00 |
9:00 |
Reception
& Poster Papers |
Poster: A Location-Privacy Approach for Continuous Queries. Douglas Steiert, Dan Lin, Quincy Conduff, and Wei Jiang
Poster: Design
of an Anomaly-based Threat Detection & Explication System. Robert Luh, Sebastian Schrittwieser, Stefan Marschalek, Helge
Janicke, and Edgar Weippl
Poster:
Constrained Policy Mining in Attribute Based Access Control.
Mayank Gauta, Sadhana Jha, Shamik Sural, Jaideep Vaidya, and Vijayalakshmi
Atluri
Poster:Access Control Model
for the Hadoop Ecosystem. Maanak Gupta, Farhan
Patwa, and Ravi Sandhu
Poster: On the
Safety and Efficiency of Virtual Firewall Elasticity Control. Hongda Li, Juan
Deng, Hongxin Hu, Kuang-Ching Wang, Gail-Joon Ahn, Ziming Zhao, and Wonkyu
Han |
|
|
|
|
|
22-Jun |
7:30 |
8:30 |
Breakfast |
|
|
9:30 |
10:30 |
Keynote
Talk II (Edgar Weippl): Leveraging Hardware Isolation for Process Level Access Control &
Authentication |
Dr. Marten van Dijk
(University of Connecticut) |
|
10:30 |
11:00 |
Coffee
Break |
|
|
11:00 |
12:30 |
Session
IV (Edgar Weippl): Formal Techniques I |
A Framework for the Cryptographic Enforcement of Information
Flow Policies. James Alderman, Jason Crampton and
Naomi Farley
Towards PII-based
Multiparty Access Control for Photo Sharing in Online Social Networks. Nishant Vishwamitra, Yifang Li, Kevin Wang, Hongxin Hu, Kelly
Caine and Gail-Joon Ahn
Verifiable
Assume-Guarantee Privacy Specifications for Actor Component Architectures. Claiborne Johnson,
Tom MacGahan, John Heaps, Kevin Baldor, Jeffery von Ronne and Jianwei Niu |
|
12:30 |
1:30 |
Lunch |
|
|
1:30 |
3:00 |
Session
V (Ninghui Li): Panel Session - Access Control in Mobile Operating Systems |
|
|
3:00 |
3:30 |
Coffee
Break |
|
|
3:30 |
5:00 |
Session
VI (Jianwei Niu): Demo |
Demo: Authorization Enforcement Detection. Ehood Porat, Shmuel Tikochinski, and Ariel Stulman
Demo: Multi-Layer Authorization Framework for a Representative
Hadoop Ecosystem Deployment. Maanak Gupta, Farhan
Patwa, James Benson, and Ravi Sandhu
Demo:
Provable Enforcement of HIPAA-Compliant Release of Medical Records Using
History Aware Programming Language. Thomas
MacGahan Claiborne Johnson, Armando Rodriguez, Jeffery von Ronne, and Jianwei
Niu
Demo: NTApps: A Network Traffic Analyzer of Android Applications. Rodney Rodriguez, Shaikh Mostafa, and Xiaoyin Wang |
|
6:00 |
9:00 |
Social
Event at Indiana State Museum |
Meet at hotel lobby
at 5:15pm to walk to the Museum |
|
|
|
|
The
social event includes: (a) visit to second level of the museum 6:00pm-7:30pm;
(b) dinner in the museum bridge 7:30pm-9:00pm |
23-Jun |
7:30 |
8:30 |
Breakfast |
|
|
8:30 |
9:30 |
Session
VII (Xukai Zou): Formal Techniques II |
On the Satisfiability of Workflows with Release Points. Jason Crampton, Gregory Gutin and Rémi Watrigant
A Secure Sum Protocol and Its Application to Privacy-preserving
Multi-party Analytics. Shagufta Mehnaz, Gowtham Bellala and
Elisa Bertino |
|
9:30 |
10:50 |
Session
VIII (Elisa Bertino): Short Papers |
Short Paper: A Distributed Multi-Authority Attribute Based
Encryption Scheme for Secure Sharing of Personal Health Records. Harsha Sandaruwan
Gardiyawasam Pussewalage and Vladimir Oleshchuk
Short Paper: Enabling Data Sharing in Contextual Environments:
Policy Representation and Analysis. Erisa Karafili
and Emil C. Lupu
Short Paper: Mining
Relationship-Based Access Control Policies. Thang
Bui, Scott Stoller and Jiajie Li
Short
Paper: Security Analysis and Legal Compliance Checking for the Design of
Privacy-friendly Information Systems. Paolo
Guarda, Silvio Ranise and Hari Siswantoro
|
|
10:50 |
11:10 |
Coffee
Break |
|
|
11:10 |
12:00 |
Closing
Panel |
Elisa Bertino |
|
12:00 |
1:30 |
Boxed
Lunch |
|