Arrival.
9.00-9.20 | Registration. |
|
9.20-9.30 | Welcome (by Steve Barker and Vijay Atluri) |
|
9.30-10.30 | Session I: Access Control |
|
| Dynamic Fine-grained Meta-Level Access Control in SQL |
| Steve Barker |
|
| On the Formal Analysis of a Spatio-Temporal Role-Based Access Control Model |
| Manachai Toahchoodee and Indrakshi Ray |
|
10.30-11.00 | Break |
|
11.00-12.00 | Session II: Audit and Logging |
|
| A Unified Audit Expression Model for Auditing SQL Queries |
| Vikram Goyal, S.K. Gupta and Anand Gupta |
|
| A New Approach to Secure Logging |
| Di Ma and Gene Tsudik |
|
12.00-1.00 | Keynote: Ross Anderson. Security, functionality and scale? |
|
1.00-2.00 | Lunch |
|
2.00-3.30 | Session III: Privacy I |
|
| P4A: A New Privacy Model for XML |
| Ken Barker and Angela Duta |
|
| Privacy-aware Collaborative Access Control in Web-based Social Networks |
| Barbara Carminati and Elena Ferrari |
|
| A Privacy-Preserving Ticketing System |
| Kristof Verslype, Bart De Decker, vincent naessens, Girma Nigusse, Jorn Lapon and Pieter Verhaeghe |
|
3.30-4.00 | Break |
|
4.00-5.30 | Session IV: Systems Security |
|
| The Analysis of Windows Vista Disk Encryption Algorithm |
| Mohamed Abo El-Fotouh and Klaus Diepold |
|
| Shared and Searchable Encrypted Data for Untrusted Servers |
| Changyu Dong, Giovanni Russello and Naranker Dulay |
|
| Secure Construction of Contingency Tables from Distributed Data |
| Haibing Lu, Xiaoyun He and Jaideep Vaidya |
9.00-10.00 | Invited Talk: Anoop Singhal. Web Services Security: Techniques and Challenges |
|
10.00-11.00 | Session V: Certificate Management |
|
| Empirical Analysis of Certi/cate Revocation Lists |
| Daryl Walleck, Yingjiu Li and Shouhuai Xu |
|
| Using New Tools for Certificate Repositories Generation in MANETs |
| Candelaria Hernandez-Goya, Pino Caballero-Gil, Oscar Delgado, Jezabel Molina-Gil and Candido Caballero-Gil |
|
11.00-11.30 | Break |
|
11.30-12.30 | Session VI: Privacy II |
|
| Exclusive Strategy for Generalization Algorithms in Micro-Data Disclosure |
| Lei Zhang, Lingyu Wang, Sushil Jajodia and Alexander Brodsky |
|
| Protecting the Publishing Identity in Multiple Tuples |
| Youdong Tao, Yunhai Tong, Shaohua Tan, Shiwei Tang and Dongqing Yang |
|
12.45-1.45 | Lunch |
|
2.00-3.30 | Panel |
|
| What are the key challenges in distributed security? |
| Steve Barker, David Chadwick, Jason Crampton, Emil Lupu, Bhavani Thuraisingham |
|
3.30-4.00 | Break |
|
4.00-5.00 | Session VII: Trusted Computing Platforms |
|
| On the Applicability of Trusted Computing in Distributed Authorization using Web Services |
| Aarthi Nagarajan, Vijay Varadharajan, Michael Hitchens and Saurabh Arora |
|
| Preventing Content Leakage using Trusted Computing |
| Muntaha Alawneh and Imad Abbadi |
|
5.00-5.45 | Business Meeting |
9.00-10.30 | Session VIII: Security Policies and Metrics |
|
| Regulating Exceptions in Healthcare using Policy Spaces |
| Claudio Agostino Ardagna, Sabrina De Capitani di Vimercati, Tyrone Grandison, Sushil Jajodia and Pierangela Samarati |
|
| Towards Automation of Testing High-Level Security Properties |
| Aiman Hanna, Hai Zhou Ling, Jason Furlong and Mourad Debbabi |
|
| An Attack Graph-Based Probabilistic Security Metric |
| Lingyu Wang, Tania Islam, Tao Long, Anoop Singhal and Sushil Jajodia |
|
10.30-11.00 | Break |
|
11.00-12.30 | Session IX: Web and Pervasive Systems |
|
| An Opinion Model for Evaluating Malicious Activities in Pervasive Computing Systems |
| Indrajit Ray, Nayot Poolsappasit and Rinku Dewri |
|
| DIWeDa - Detecting Intrusions in Web Databases |
| Alex Roichman and Ehud Gudes |
|
| Securing Workflows with XACML, RDF and BPEL |
| Vijayant Dhankhar, Saket Kaushik and Duminda Wijesekera |
|
12.45-1.45 | Lunch |