[click for picture] 19th Annual IFIP WG 11.3 Working Conference on Data and Applications Security
Nathan Hale Inn, University of Connecticut, Storrs, CT, U.S.A., August 7-10, 2005
dummy dummy
Call for Papers  [pdf]   |    Submissions   |    Program   |    Registration


Program

Monday August 8, 2005
 
09:00 - 09:15 Welcome and Opening
T.C. Ting, Sushil Jajodia, and Duminda Wijesekera

09:30 - 10:30 Invited talk (Chair: Sushil Jajodia)
Divesh Srivastava (AT & T)

10:30 - 11:00 Break
 
11:00 - 12:30 Session 1: Policy (Chair: Ting Yu)
Towards Privacy-enhanced Authorization Policies and Languages
C.A Ardagna, E. Damiani, S. De Capitani di Vimercati, P. Samarati

Revocation of Obligations
Andreas Schaad

Role Slices: A notation for RBAC Permission Assignment and Enforcement
J. A. Pavlich-Mariscal, T. Doan, L. Michel, S.A. Demurjian, and T. C. Ting

12:30 - 2:00 Lunch
 
2:00 - 3:30 Session 2: Handling Encrypted Data (Chair: Vijay Atluri)
Designing Secure Indexes for Encrypted Databases
Erez Shmueli, Ronen Waisenberg, Yuval Elovici, and Ehud Gudes

Efficiency and Security Trade-off in Supporting Range Queries on Encrypted Databases
Jun Li and Edward R. Omiecinski

Verified Query Results from Hybrid Authentication Trees
Glen Nuckolls

3:30 - 4:00 Break
 
4:00 - 5:30 Panel: Data and Application Security: Looking Forward from 1987
Moderators: Carl Landwehr and David Spooner
Panel Members: Tom Haigh, Richard Kemmerer, T.Y. Lin, Ravi Sandhu, and others


Tuesday August 9, 2005
 
9:00 - 10:30 Session 3: Networks and Protocols (Chair: Rajni Goel)
Multilevel Secure Teleconferences over Public Switched Telephone Networks
Inja Youn, Csilla Farkas, and Bhavani Thuraisingham

Security of Two-party Secure Computation
Yi-Ting Chiang, Tse-Sheng Hsu, Churn Jung Liau, and Da-Wei Wang

Reliable Scheduling of Advanced Transactions
Tai Xin, Yajie Zhu, and Indrakshi Ray

10:30 - 11:00 Break
 
11:00 - 12:30 Session 4: Privacy (Chair: Csilla Farkas)
Privacy-preserving Decision Trees over Vertically Partitioned Data
Jaideep Vaidya and Chris Clifton

Privacy-preserving Collaborative Association Rule Mining
Justin Zhan, Stan Matwin, LiWu Chang

Privacy-preserving Distributed k-anonymity
Wei Jiang and Chris Clifton

12:30 - 2:00 Lunch
 
2:00 - 2:30 Business Meeting
 
2:30 - Area Tour


 
Wednesady August 10, 2005
 
9:00 - 10:30 Session 5: Firewalls and Intrusion Detection (Chair: David Spooner)
Towards Database Firewalls
Kun Bai, Hai Wang, and Peng Liu

Complete Redundancy Detection in Firewalls
Alex X. Liu and Mohomed G. Gouda

A Comprehensive Approach to Anomaly Detection in Relational Databases
Adrian Spalka and Jan Lehnhardt

10:30 - 12:30 Break
 
11:00 - 12:30 Session 6: Web Security (Chair: Sylvia Osborn)
Authorization Architecture for Web Services
Sarath Indrakanti, Vijay Varadharajan, and Michael Hitchens

Secure Model Management Operations for the Web
Guanglei Song, Kang Zhang, Bhavani Thuraisingham, and Jun Kong

Facilitating Automatic Resource Sharing among Ad-hoc Dynamic Coalitions
Janice Warner, Vijaylakshmi Atluri, and Ravi Mukkamala

12:30 - 2:00 Lunch
 
2:00 - 3:30 Session 7: Secure Software and Management (Chair: Joon Park)
Secure Mediation with Mobile Code
Joachim Biskup, Barbara Sprick, and Lena Wiese

Security Vulnerabilities in Software Systems: A Quantitative Perspective
O. H. Alhazmi, Y. K. Malaiya and I. Ray

Trading Off Security in a Service Oriented Architecture
Garret Swart, Benjamin Aziz, Simon Foley, and John Herbert

3:30 - 4:00 Break
 
4:00 - 5:30 Session 8: : Identity Management and Encryption (Chair: Indrakshi Ray)
Towards Secure Identity Management Systems
Joon S Park and Harish S. Krishnan

Security Issues in Querying Encrypted Data
M. Kantracioglu and C. Clifton

Blind custodians: A Database Service Architectures that Supports Privacy without Encryption
Amihai Motro and Francesco Parisi-Presicce



dummy