[click for picture] 22nd Annual IFIP WG 11.3 Working Conference on Data and Applications Security
Strand Palace Hotel, London, U.K., July 13-16, 2008
dummy dummy
Call for Papers  [pdf]   |    Committees   |    Important Dates   |    Submissions   |    Advanced Program   |    Registration   |    Hotel   |    Travel


Advanced Program

Sunday 13th July 2008

Arrival.

Monday 14th July 2008

9.00-9.20Registration.
9.20-9.30Welcome (by Steve Barker and Vijay Atluri)
9.30-10.30Session I: Access Control
Dynamic Fine-grained Meta-Level Access Control in SQL
Steve Barker
On the Formal Analysis of a Spatio-Temporal Role-Based Access Control Model
Manachai Toahchoodee and Indrakshi Ray
10.30-11.00 Break
11.00-12.00 Session II: Audit and Logging
A Unified Audit Expression Model for Auditing SQL Queries
Vikram Goyal, S.K. Gupta and Anand Gupta
A New Approach to Secure Logging
Di Ma and Gene Tsudik
12.00-1.00 Keynote: Ross Anderson. Security, functionality and scale?
1.00-2.00 Lunch
2.00-3.30Session III: Privacy I
P4A: A New Privacy Model for XML
Ken Barker and Angela Duta
Privacy-aware Collaborative Access Control in Web-based Social Networks
Barbara Carminati and Elena Ferrari
A Privacy-Preserving Ticketing System
Kristof Verslype, Bart De Decker, vincent naessens, Girma Nigusse, Jorn Lapon and Pieter Verhaeghe
3.30-4.00Break
4.00-5.30Session IV: Systems Security
The Analysis of Windows Vista Disk Encryption Algorithm
Mohamed Abo El-Fotouh and Klaus Diepold
Shared and Searchable Encrypted Data for Untrusted Servers
Changyu Dong, Giovanni Russello and Naranker Dulay
Secure Construction of Contingency Tables from Distributed Data
Haibing Lu, Xiaoyun He and Jaideep Vaidya

Tuesday 15th July 2008

9.00-10.00Invited Talk: Anoop Singhal. Web Services Security: Techniques and Challenges
10.00-11.00Session V: Certificate Management
Empirical Analysis of Certi/cate Revocation Lists
Daryl Walleck, Yingjiu Li and Shouhuai Xu
Using New Tools for Certificate Repositories Generation in MANETs
Candelaria Hernandez-Goya, Pino Caballero-Gil, Oscar Delgado, Jezabel Molina-Gil and Candido Caballero-Gil
11.00-11.30Break
11.30-12.30Session VI: Privacy II
Exclusive Strategy for Generalization Algorithms in Micro-Data Disclosure
Lei Zhang, Lingyu Wang, Sushil Jajodia and Alexander Brodsky
Protecting the Publishing Identity in Multiple Tuples
Youdong Tao, Yunhai Tong, Shaohua Tan, Shiwei Tang and Dongqing Yang
12.45-1.45Lunch
2.00-3.30Panel
What are the key challenges in distributed security?
Steve Barker, David Chadwick, Jason Crampton, Emil Lupu, Bhavani Thuraisingham
3.30-4.00Break
4.00-5.00Session VII: Trusted Computing Platforms
On the Applicability of Trusted Computing in Distributed Authorization using Web Services
Aarthi Nagarajan, Vijay Varadharajan, Michael Hitchens and Saurabh Arora
Preventing Content Leakage using Trusted Computing
Muntaha Alawneh and Imad Abbadi
5.00-5.45Business Meeting

Banquet

Wednesday 16th July 2008

9.00-10.30Session VIII: Security Policies and Metrics
Regulating Exceptions in Healthcare using Policy Spaces
Claudio Agostino Ardagna, Sabrina De Capitani di Vimercati, Tyrone Grandison, Sushil Jajodia and Pierangela Samarati
Towards Automation of Testing High-Level Security Properties
Aiman Hanna, Hai Zhou Ling, Jason Furlong and Mourad Debbabi
An Attack Graph-Based Probabilistic Security Metric
Lingyu Wang, Tania Islam, Tao Long, Anoop Singhal and Sushil Jajodia
10.30-11.00Break
11.00-12.30Session IX: Web and Pervasive Systems
An Opinion Model for Evaluating Malicious Activities in Pervasive Computing Systems
Indrajit Ray, Nayot Poolsappasit and Rinku Dewri
DIWeDa - Detecting Intrusions in Web Databases
Alex Roichman and Ehud Gudes
Securing Workflows with XACML, RDF and BPEL
Vijayant Dhankhar, Saket Kaushik and Duminda Wijesekera
12.45-1.45Lunch



dummy