|
WED |
|
13-Jun-18 |
7:30-8:30 |
Breakfast |
8:00-9:00 |
Registration |
9:00-9:15 |
Opening |
9:15-10:15 |
Keynote-Daphne Yao (Virginia
Tech)
Data Breach and Multiple Points to Stop It
|
10:15-10:30 |
Coffee Break |
10:30-12:00 |
Research Track - Access Control
and Authentication (Session Chair: Dianxiang Xu, dianxiangxu@boisestate.edu) |
|
Automated Coverage-Based Testing
of XACML Policies (Dianxiang Xu (Boise State University); Roshan Shrestha
(Boise State University); Ning Shen (Boise State University)) |
|
Parametric RBAC Maintenance via
Max-SAT (Marco Benedetti (Bank of Italy); Marco Mori (Bank of Italy)) |
|
Independent Key Distribution
Protocols for Broadcast Authentication (Bruhadeshwar Bezawada (Colorado State
University); Sandeep Kulkarni (Michigan State University); Indrajit Ray
(Colorado State University); Indrakshi Ray (Colorado State University); Rui
Li (Dongguan University of Technology)) |
|
12:00-1:30 |
Lunch Break |
|
1:30-2:30 |
Blue sky session (Session Chair - Daphne Yao, Virginia Tech): Next generation security services for emerging networks |
|
Authorization Framework for
Secure Cloud Assisted Connected Cars and Vehicular Internet of Things (Maanak
Gupta (University of Texas at San Antonio); Ravi Sandhu (University of Texas
at San Antonio)) |
|
Securing Named Data Networks:
Challenges and the Way Forward (Elisa Bertino (Purdue University); Mohamed
Nabeel (Qatar Computing Research Institute)) |
|
Multi-Party Access Control:
Requirements, State of the Art and Open Challenges (Anna Squicciarini (The
Pennsylvania State University); Sarah Rajtmajer (Quantitative Scientific
Solutions); Nicola Zannone (Eindhoven University of Technology)) |
|
|
2:30 - 2:45 |
Coffee Break |
2:45 - 3:45 |
Short papers (Session Chair - Bo Luo, bluo@ku.edu) |
|
Privacy-Aware Risk-Adaptive
Access Control in Health Information Systems using Topic Models (Wenxi Zhang
(Institute of Software Chinese Academy of Science); Hao Li (Institute of
Software Chinese Academy of Science); Min Zhang (Institute of Software Chinese
Academy of Science); Zhiquan Lv (National Computer Network Emergency Response
Technical Team/Coordination Center of China)) |
|
"Kn0w Thy Doma1n
Name": Unbiased Phishing Detection Using Domain Name Based Features
(Hossein Shirazi (Colorado State University); Bruhadeshwar Bezawada (Colorado
State University); Indrakshi Ray (Colorado State University)) |
|
A Blockchain-based Distributed
Access Control for the Internet of Things (Roberto Di Pietro (Hamad Bin
Khalifa University); Xavier Salleras (Pompeu Fabra University); Matteo
Signorini (Nokia Bell Labs); Erez Waisbard (Nokia Bell Labs)) |
|
Distributed Usage Control
Enforcement Through Trusted Platform Modules And SGX Enclaves (Paul Georg
Wagner (Karlsruhe Institute of Technology); Pascal Birnstill (Fraunhofer);
Jargen Beyerer (Fraunhofer)) |
3:45 - 4:00 |
Coffee Break |
4:00 - 5:30 |
Research Track - Privacy (Session Chair - Bruhadeshwar Bezawada, bez.bru@gmail.com) |
|
My Friend Leaks My Privacy:
Modeling and Analyzing Privacy in Social Networks (Lingjing Yu (Chinese
Academy of Sciences); Sri Mounica Motipalli (The University of Kansas);
Dongwon Lee (The Pennsylvania State University); Peng Liu (The Pennsylvania
State University); Heng Xu (The Pennsylvania State University); Qingyun Liu
(Chinese Academy of Sciences); Jianlong Tan (Chinese Academy of Sciences); Bo
Luo (The University of Kansas)) |
|
Sensing or Watching? Balancing
Utility and Privacy in Sensing Systems via Collection and Enforcement
Mechanisms (Adam J. Lee (University of Pittsburgh); Jacob T. Biehl (FXPAL);
Conor Curry (University of Pittsburgh)) |
|
Solving Quantitative Workflow
Satisfiability Problems with Optimization Modulo Theories Techniques (Clara
Bertolissi (Aix-Marseille University); Daniel Ricardo Dos Santos (Eindhoven
University of Technology); Silvio Ranise (Fondazione Bruno Kessler)) |
|
7:00- 9:00 |
Reception |
|
|
|
THUR |
|
14-Jun-18 |
7:30-8:30 |
Breakfast |
8:00-9:00 |
Registration |
9:00-10:00 |
Keynote-Dan Thomsen (Smart
Information Flow Technologies - SIFT)
Network Policy Enforcement Using Transactions: The NEUTRON Approach |
10:00-10:30 |
Coffee Break |
10:30-12:00 |
Research Track - ABAC (Session Chair - Yuan Cheng, California State University, Sacramento) |
|
A Deep Learning Approach for
Extracting Attributes of ABAC Policies (Manar Alohaly (University of North
Texas); Hassan Takabi (University of North Texas); Eduardo Blanco (University
of North Texas)) |
|
Efficient Extended ABAC
Evaluation (Charles Morisset (Newcastle University); Tim Willemse (Eindhoven
University of Technology); Nicola Zannone (Eindhoven University of
Technology)) |
|
Mining Positive and Negative
Attribute-Based Access Control Policy Rules (Padmavathi Iyer (University at
Albany - SUNY); Amirreza Masoumzadeh (University at Albany - SUNY)) |
12:00-1:30 |
Lunch Break |
1:30-2:30 |
Blue sky session (Session Chair - Omar Haider Chowdhury, University of Iowa): Innovation in access control and
privacy-aware data management for Big Data and IoT |
|
Towards A Privacy-Aware
Quantified Self Data Management Framework (Bhavani Thuraisingham and Murat
Kantarcioglu (The University of Texas at Dallas); Elisa Bertino (Purdue
University); Jonathan Z. Bakdash (U.S. Army Research Laboratory Field Element
at The University of Texas Dallas and Department of Psychology, Counseling,
and Special Education, Texas A&M Commerce); Maribel Fernandez (Kings
College, University of London)) |
|
Access Control in the Era of Big
Data: State of the Art and Research Directions (Pietro Colombo (University of Insubria); Elena Ferrari (University of Insubria)) |
|
Self-Generation of Access Control Policies (Elisa Bertino (Purdue University); Seraphin Calo (IBM); Dinesh Verma (IBM); Gregory Cirincione (ARL); Supriyo Chakraborty (IBM)) |
2:30-4:30 |
Demo/Posters |
|
Poster: Reactive Access Control
Systems (Maryam Davari (Purdue University); Elisa Bertino (Purdue
University)) |
|
Poster: Toward A Code Pattern
Based Vulnerability Measurement Model (John Heaps (University of Texas at San
Antonio); Rocky Slavin (University of Texas at San Antonio); Xiaoyin Wang
(University of Texas at San Antonio)) |
|
Poster: Using Gini Impurity to
Mine Attribute-based Access Control Policies with Environment Attributes
(Saptarshi Das (IIT Kharagpur, India); Shamik Sural (IIT Kharagpur, India);
Jaideep Vaidya (Rutgers University); Vijayalakshmi Atluri (Rutgers University)) |
|
Poster: Towards Greater
Expressiveness, Flexibility, and Uniformity in Access Control (Jiaming Jiang
(North Carolina State University); Rada Chirkova (North Carolina State
University); Jon Doyle (North Carolina State University); Arnon Rosenthal
(The MITRE Corporation)) |
4:30 - 5:30 |
Inaugural Junior
Keynote - Omar Haider Chowdhury (the University of Iowa) |
|
How Inadequate Specification,
Buggy Implementation, and Deficient Platform Support Hinder Security |
5:30 - 6:15 |
Test of time award Invited Talk |
|
ROWLBAC: representing role based
access control in OWL. T. Finin, A. Joshi, L. Kagal, J. Niu, R. Sandhu, W.
Winsborough, and B. Thuraisingham. In Proceedings of the 13th ACM symposium
on Access control models and technologies (SACMAT '08). ACM, New York, NY,
USA, 73-82. |
7:00- 9:00 |
Conference Banquet |
|
|
FRI |
|
15-Jun-18 |
7:30-8:30 |
Breakfast |
9:00-10:00 |
Panel: Attributes? Roles? Relationships? or no model at all? Model base vs Learnt Policies: finding the balance between expressible and usable policies (Moderator: Jorge Lobo, Universitat Pompeu Fabra) |
|
Panelists: Elisa Bertino (Purdue University), Ian Molloy (IBM Research), Ravi Sandhu (UTSA), and Jaideep Vaidya (Rutgers University) |
10:00-10:15 |
Coffee Break |
10:15-11:45 |
Research Track - IoT (Session Chair - Maanak Gupta, gmaanakg@yahoo.com) |
|
Access Control Enforcement
within MQTT-based Internet of Things Ecosystems (Pietro Colombo (University of Insubria); Elena Ferrari (University of Insubria)) |
|
A Lazy Approach to Access
Control as a Service (ACaaS) for IoT (Tahir Ahmad (Foundation Bruno Kessler);
Umberto Morelli (Foundation Bruno Kessler); Nicola Zannone (Eindhoven
University of Technology); Silvio Ranise (Foundation Bruno Kessler)) |
|
HCAP: A History-Based Capability
System for IoT Devices (Lakshya Tandon (University of Calgary); Philip W. L.
Fong (University of Calgary); Reihaneh Safavi-Naini (University of Calgary)) |
11:45-12:15 |
Closing |
12:15 - 1:00 |
Lunch Break |