Call for Papers | Paper submission | Program | PC login
Program
Sunday July 25, 2004
- 15:00 - Arrival
-
- 18:00 - 19:30 Registration (in front of hotel reception)
-
- 18:30 - Antemare Bar
-
- 20:00 - 22:00 Dinner (Arcadin Room)
-
- Monday July 26, 2004
-
- 07:30 - 08:45 Breakfast (Arcadin Room)
-
- 09:00 - 09:30 Welcome and Opening (Gaudí Room)
-
- 09:30 - 10:30 Invited talk(Gaudí Room)
-
- 10:30 - 11:00 Break (Hall)
-
- 11:00 - 13:00 Session 1: Access Control (Gaudí Room)
- Attribute Mutability in Usage Control
J. Park, X. Zhang, R. Sandhu
- STAR-Tree: An Index Structure for Efficient Evaluation of Spatiotemporal Authorizations
V. Atluri, Q. Guo
- Delegation and Revocation of Obligations - An Extended Analysis
A. Schaad
- Implementing Real-Time Update of Access Control Policies
Indrakshi Ray, T. Xin
- 13:00 - 14:25 Lunch (Arcadin Room)
-
- 14:30 - 16:00 Session 2: Data Protection Techniques (Gaudí Room)
- Defending Against Additive Attacks with Maximal Errors in Watermarking Relational Databases
Y. Li, V. Swarup, S. Jajodia
- Performance-Conscious Key Management in Encrypted Databases
H. Hacigumus, S. Mehrotra
- Damage Discovery in Distributed Database Systems
Y. Zuo, B. Panda
- 16:00 - 16:30 Break (Hall)
-
- 16:30 - 18:00 Session 3: Database Theory and Inference Control (Gaudí Room)
- Information flow analysis for file systems and databases using Labels
E. Gudes, L.V. Mancini, F. Parisi-Presicce
- Refusal in Incomplete Databases
J. Biskup, T. Weibert
- Why Is this User Asking so Many Questions? Explaining Sequences of Queries
A.C. Acar, A. Motro
- 19:30 - Antemare Bar
-
- 20:00 - 22:00 Conference Banquet (Arcadin Room)
-
- Tuesday July 27, 2004
-
- 07:30 - 08:55 Breakfast (Arcadin Room)
-
- 09:30 - 10:30 Invited talk(Gaudí Room)
-
- 10:30 - 11:00 Break (Hall)
-
- 11:00 - 13:00 Session 4: Access Control Design and Management (Gaudí Room)
- Policy-based Security Management for Enterprise Systems
R. Mukkamala, L. Chekuri, M. Moharrum, S. Palley
- A Pattern System for Access Control
T. Priebe, E. Fernandez, J.I. Mehlau, E. Masovic, G. Pernul
- RBAC/MAC Security Analysis and Design for UML
T. Doan, S. Demurjian, C. Phillips, T.C. Ting
- A Design for Parameterized Roles
M. Ge, S.L. Osborn
- 13:00 - 14:00 Lunch (Arcadin Room)
-
- 14:00 - 14:45 Business Meeting (Gaudí Room)
-
- 14:45 - 18:15 Excursion to Codorniu's cellar )
-
- 18:30 - 20:30 visit to Palau Maricel
-
- 21:00 - 22:30 Dinner (the place depends on the weather)
-
- Wednesday July 28, 2004
-
- 07:30 - 08:55 Breakfast (Arcadin Room)
-
- 9:30 - 11:00 Session 5: Distributed Systems (Gaudí Room)
- Efficient Verification of Delegation in Distributed Group Membership Management
L. Huraj, H. Reiser
- Web Resource Usage Control in RSCLP
S. Barker
- Securely Distributing Centralized Multimedia Content Utilizing Peer-to-Peer Cooperation
Indrajit Ray, T. Hajek
- 11:00 - 11:30 Break (Hall)
-
- 11:30 - 13:00 Panel (Gaudí Room)
-
- 13:00 - 14:00 Lunch (Arcadin Room)
-
- 14:00 - 15:30 Session 6: Privacy (Gaudí Room)
- On The Damage and Compensation of Privacy Leakage
D. Wang, C. Liau, T. Hsu
- An Experimental Study of Distortion-based Techniques for Association Rule Hiding
E. Pontikakis, A. Tsitsonis, V. Verykios
- Privacy-Preserving Data Mining in Distributed Environments
J. Zhan, S. Matwin, L.W. Chang
- 15:30 - 16:00 Break (Hall)
-
- 16:00 - 17:30 Session 7: Network Protection and Configuration (Gaudí Room)
- Configuring Storage Area Networks for Mandatory Security
B. Aziz, S. Foley, J. Herbert, G. Swart
- A Framework for Trusted Wireless Sensor Networks
J. S. Park, A. Jain
- Secure Bridges: A Means to Conduct Secure Teleconferences over Public Telephones
I. Youn, D. Wijesekera
- 17:30 - 18:00 Closing Remarks
-
|