All times are in Central Daylight Time (CDT).
The program is tentative and may be subject to changes.
Day 1 (Wednesday, 15 May 2024) |
|
Introductory
Remarks |
9:00-9:15 |
Keynote 1 Session
Chair: Jianwei Niu |
|
AI/ML,
Graphs, and Access Control Ashish Kundu |
9:15-10:15 |
Coffee
Break Conference
venue |
10:15-10:45 |
Regular Track 1 (Privacy) Session Chair: Barbara Masucci |
|
Full
Paper ToneCheck: Unveiling the Impact
of Dialects in Privacy Policy Jay Barot, Ali Allami, Yin Ming and Dan Lin |
10:45-11:15 |
Full
Paper Make
Split, not Hijack: Preventing Feature-Space Hijacking Attacks in Split
Learning Tanveer Khan, Mindaugas Budzys and
Antonis Michalas |
11:15-11:45 |
Short
Paper Making
privacy-preserving federated graph analytics with strong guarantees practical
(for certain queries) Kunlong Liu and Trinabh Gupta |
11:45-12:05 |
Lunch Conference
venue |
12:05-13:30 |
Work-In-Progress
Track Session Chair: Theo Dimitrakos |
|
Work-In-Progress Enhancing
the Comprehension of XACML Policies Gelareh Hasel Mehri, Tien Dung Le, Bram Cappers, Jerry Den
Hartog and Nicola Zannone |
13:30-13:50 |
Work-In-Progress Defending
Multi-Cloud Applications Against Man-in-the-Middle Attacks Morgan Reece, Sudip Mittal, Theodore Lander, Nidhi
Rastogi, Andy Sampson and Josiah Dykstra |
13:50-14:10 |
Work-In-Progress SecureCheck: User-Centric and
Geolocation-Aware Access Mediation Contracts for Sharing Private Data Jacob Hopkins and Carlos Rubio Medrano |
14:10-14:30 |
Coffee
Break Conference
venue |
14:30-15:00 |
Regular Track 2 (Policy
Analysis and Validation) Session Chair: Carlos Rubio Medrano |
|
Full
Paper Static
and Dynamic Analysis of a Usage Control System Ulrich Schöpp, Fathiyeh
Faghih, Subhajit Bandopadhyay, Hussein Joumaa,
Amjad Ibrahim, Chuangjie Xu, Xin Ye and Theo Dimitrakos |
15:00-15:30 |
Full
Paper SPRT:
Automatically Adjusting SELinux Policy for
Vulnerabilities Mitigation Hanyu Wang, Aimin Yu, Lifang Xiao,
Jin Li and Xu Cao |
15:30-16:00 |
Short
Paper Utilizing
Threat Partitioning for more Practical Network Anomaly Detection Brian Ricks, Patrick Tague, Bhavani Thuraisingham and Sriraam
Natarajan |
16:00-16:20 |
ACM
SIGSAC Women's Networking Reception All
the conference participants are welcome! Session
Chair - Elisa Bertino and Jaideep Vaidya |
From 18:00 |
Day 2 (Thursday, 16 May 2024) |
|
Keynote 2 Session Chair: Ram Krishnan |
|
Cryptographic
Enforcement of Access Control Policies: Models, Applications, and Future
Directions Barbara Masucci |
9:00-10:00 |
Coffee
Break Conference
venue |
10:00-10:30 |
Regular Track 3 (LLMs and Access
Control Management) Session Chair: Mitra Bokaei Hosseini |
|
Full
Paper Prompting
LLM to Enforce and Validate CIS Critical Security Control Mohiuddin Ahmed, Jinpeng Wei and
Ehab Al-Shaer |
10:30-11:00 |
Full
Paper Pairing
Human and Artificial Intelligence: Enforcing Access Control Policies with
LLMs and Formal Specifications Carlos Rubio Medrano, Akash Kotak, Wenlu
Wang and Karsten Sohr |
11:00-11:30 |
Blue Sky/Vision Track Session Chair: Mitra
Bokaei Hosseini |
|
Blue
Sky/Vision How
to Raise a Robot — A Case for Neuro-Symbolic AI in Constrained Task Planning
for Humanoid Assistive Robots Niklas Hemken, Florian Jacob, Fabian Tërnava,
Rainer Kartmann, Tamim Asfour and Hannes
Hartenstein |
11:30-12:00 |
Lunch Conference
venue |
12:00-13:30 |
Regular Track 4 (Access Control Framework) Session Chair: Amir Masoumzadeh |
|
Full
Paper A
Game Theoretic Framework for Multi-Party Access Control Gelareh Hasel Mehri, Benjamin Monmege,
Clara Bertolissi and Nicola Zannone |
13:30-14:00 |
Short
Paper A
Self-Sovereign Identity Approach to Decentralized Access Control with
Transitive Delegations Pieter-Jan Vrielynck, Tim Van Hamme,
Rawad Ghostin, Bert Lagaisse,
Davy Preuveneers and Wouter Joosen |
14:00-14:20 |
Short
Paper Obligation
Management Framework for Usage Control Hussein Joumaa, Ali Hariri, Ana Petrovska, Oleksii Osliak, Theo
Dimitrakos and Bruno Crispo |
14:20-14:40 |
Coffee
Break Conference
venue |
14:40-15:00 |
Panel Moderator: Ram Krishnan |
|
Panel Title:
Zero Trust Architectures and the Future of Security and Privacy Panelists:
Elisa Bertino, Hongxin Hu, Amir Masoumzadeh,
and Shouhuai Xu |
15:00-16:00 |
Celebration
of Prof. Ravi Sandhu Session Chair: Jianwei
Niu and Jaideep Vaidya |
16:00-17:00 |
Conference
Banquet Venue |
From 18:00 |
Day 3 (Friday 17 May 2024) |
|
Keynote 3 Session Chair: Jaideep Vaidya |
|
Trustworthy
Artificial Intelligence for Securing Transportation Systems Bhavani Thuraisingham |
9:00-10:00 |
Coffee
Break Conference
venue |
10:00-10:20 |
Regular Track 5 (Policy Management and Enforcement) Session Chair: Rocky Slavin |
|
Full
Paper Converting
Rule-Based Access Control Policies: From Complemented Conditions to Deny
Rules Josue Ruiz, Amir Masoumzadeh, Paliath Narendran and Padmavathi Iyer |
10:20-10:50 |
Full Paper Hierarchical
Key Assignment Schemes with Key Rotation Roberta
Cimorelli Belfiore, Alfredo De Santis, Anna Lisa Ferrara and Barbara Masucci |
10:50-11:20 |
Short
Paper FE[r]Chain:
Enforcing Fairness in Blockchain Data Exchanges Through Verifiable Functional
Encryption Camille Foucault, Reyhaneh Rabbaninejad,
Tassos Dimitriou and Antonis Michalas |
11:20-11:40 |
Poster
Paper Circles
of Trust: A Voice-Based Authorization Scheme for Securing IoT Smart Homes Jennifer Mondragon, Carlos Rubio Medrano, Gael Cruz and Dvijesh Shastri |
11:40-11:50 |
Announcement
of the Best Paper Award and Closing Remarks |
11:50-12:00 |
Lunch/Lunch
Box Collection Conference
venue |
12:00-12:30 |