Marco Pernpruner
Security & Trust Research Unit
Center for Cybersecurity
Fondazione Bruno Kessler
Email: mpernpruner@fbk.eu
Workshop (TDI 2023) |
8:45-17:30 |
Welcome Reception (Workshop + Conference) Location: Conference venue |
18:00-19:30 |
Introductory Remarks |
9:00-9:15 |
Keynote 1Session Chair: Silvio Ranise (Fondazione Bruno Kessler and University of Trento) |
|
WebSheets: A Framework for Privacy-Centric Web Applications by Non-Programmers Scott D. Stoller |
9:15-10:15 |
Coffee Break Location: Conference venue |
10:15-10:45 |
Regular Track 1 (Privacy)Session Chair: Mahesh Tripunitara (University of Waterloo) |
|
Full Paper A Framework for Privacy-Preserving White-Box Anomaly Detection using a Lattice-Based Access Control |
10:45-11:15 |
Full Paper Privacy-Preserving Multi-Party Access Control for Third-Party UAV Services |
11:15-11:45 |
Full Paper Federated Synthetic Data Generation with Security Guarantees |
11:45-12:15 |
Lunch Location: Conference venue |
12:15-13:45 |
PanelSession Chair: Silvio Ranise (Fondazione Bruno Kessler and University of Trento) |
|
Panel Security, privacy and trust in centralized and decentralized identity management ecosystems Paolo Campegiani (Bit4id), Francesco Ventola (Poligrafico e Zecca dello Stato, IPZS) |
13:45-14:45 |
Test of Time AwardSession Chair: Jorge Lobo (ICREA-Universitat Pompeu Fabra, Spain) |
|
Remote Presentation and Award Ceremony Privacy promises that can be kept: a policy analysis method with application to the HIPAA privacy rule |
14:45-15:30 |
Coffee Break Location: Conference venue |
15:30-16:00 |
Demos and PostersSession Chair: Marco Pernpruner (Fondazione Bruno Kessler and University of Genoa) |
|
Demo A Multimodal Behavioral Biometric Scheme for Smartphone User Authentication (MBBS) |
16:00-16:15 |
Poster (Remote Presentation) Integrating Spatio-temporal Authorization With Generic Cloud-based Software Architecture for Internet Of Things Devices |
16:15-16:25 |
Poster (Remote Presentation) APETEEt: Secure Enforcement of ABAC Policies using Trusted Execution Environment |
16:25-16:35 |
Poster Attribute Based Access Control for IoT Devices in 5G Networks |
16:35-17:00 |
Poster How to Raise a Robot — Beyond Access Control Constraints in Assistive Humanoid Robots |
|
Poster Non-repudiable Secure Logging System for the Web |
|
ACM SIGSAC Women's Networking Reception All the conference participants are welcome!Location: Palazzo Benvenuti (map) |
From 18:00 |
Keynote 2Session Chair: Giada Sciarretta (Fondazione Bruno Kessler) |
|
The Category-Based Approach to Access Control, Obligations and Privacy Maribel Fernández |
9:00-10:00 |
Coffee Break Location: Conference venue |
10:00-10:30 |
Regular Track 2 (Management and Analysis of Policies)Session Chair: Nicola Zannone (Eindhoven University of Technology) |
|
Full Paper Seal: Capability-Based Access Control for Data-analytic Scenarios |
10:30-11:00 |
Full Paper (Remote Presentation) SpaceMediator: Leveraging Authorization Policies to Prevent Spatial and Privacy Attacks in Mobile Augmented Reality |
11:00-11:30 |
Short Paper Synthesizing and Analyzing Attribute-Based Access Control Model from Natural Language Policy Statements |
11:30-11:45 |
Short Paper Security Analysis of Access Control Policies for Smart Homes |
11:45-12:00 |
Lunch Location: Conference venue |
12:00-13:30 |
Regular Track 3 (Management of Expressive Policies)Session Chair: Indrakshi Ray (Colorado State University) |
|
Full Paper Expressive Authorization Policies using Computation Principals |
13:30-14:00 |
Full Paper MSNetViews: Geographically Distributed Management of Enterprise Network Security Policy |
14:00-14:30 |
Full Paper The Hardness of Learning Access Control Policies |
14:30-15:00 |
Blue Sky/Vision TrackSession Chair: Scott Stoller (Stony Brook University) |
|
Blue Sky/Vision SAFE-PASS: Stewardship, Advocacy, Fairness and Empowerment in Privacy, Accountability, Security, and Safety for Vulnerable Groups |
15:00-15:30 |
Coffee Break Location: Conference venue |
15:30-16:00 |
Keynote 3Session Chair: Roberto Carbone (Fondazione Bruno Kessler) |
|
Access control vulnerabilities in networking protocol implementations: how attackers exploit them and what to do about it Daniel Ricardo dos Santos |
16:00-17:00 |
Social Event |
17:00-19:30 |
Social Dinner Location: Ristorante Terramia (map) |
From 20:00 |
Work-In-Progress TrackSession Chair: Hannes Hartenstein (Karlsruhe Institute of Technology) |
|
Work-In-Progress (Remote Presentation) Sidecar-based Path-aware Security for Microservices |
9:00-9:15 |
Work-In-Progress Towards Automated Learning of Access Control Policies Enforced by Web Applications |
9:15-9:30 |
Lightning TalksSession Chair: Giada Sciarretta (Fondazione Bruno Kessler) |
|
Lightning Talk Behavioral Biometrics-based identity verification for new generation devices Attaullah Buriro |
9:30-9:35 |
Lightning Talk Differential Privacy querying RDF Knowledge Graph Jorge Lobo, Carlos Buil Aranda and Federico Olmedo |
9:35-9:40 |
Lightning Talk Google Drive Sharing Manager Scott D. Stoller |
9:40-9:45 |
Lightning Talk Weakly Consistent but Eventually Convergent: Access Control in the Matrix Messaging System Florian Jacob and Hannes Hartenstein |
9:45-9:50 |
Coffee Break Location: Conference venue |
10:00-10:30 |
Regular Track 4 (Extension of Access Control)Session Chair: Amirreza Masoumzadeh (University at Albany - SUNY) |
|
Full Paper (Remote Presentation) Coverage-Based Testing of Obligations in NGAC Systems |
10:30-11:00 |
Full Paper Data sharing in social networks |
11:00-11:30 |
Short Paper Specifying a Usage Control System |
11:30-11:45 |
Short Paper Qualitative Intention-aware Attribute-based Access Control Policy Refinement |
11:45-12:00 |
Announcement of the Best Paper Award and Closing Remarks |
12:00-12:15 |
Lunch/Lunch Box Collection Depending on the preference expressed during registrationLocation: Conference venue |
12:15-13:00 |