18th Annual IFIP WG 11.3 Working Conference on Data and Applications Security
Sitges, Spain, July 25-28, 2004




Call for Papers   |   Paper submission   |   Program   |   PC login




Program


Sunday July 25, 2004
15:00 -           Arrival
 
18:00 - 19:30 Registration (in front of hotel reception)
 
18:30 -           Antemare Bar
 
20:00 - 22:00 Dinner (Arcadin Room)
 

Monday July 26, 2004
 
07:30 - 08:45 Breakfast (Arcadin Room)
 
09:00 - 09:30 Welcome and Opening (Gaudí Room)
 
09:30 - 10:30 Invited talk(Gaudí Room)
 
10:30 - 11:00 Break (Hall)
 
11:00 - 13:00 Session 1: Access Control (Gaudí Room)
Attribute Mutability in Usage Control
J. Park, X. Zhang, R. Sandhu

STAR-Tree: An Index Structure for Efficient Evaluation of Spatiotemporal Authorizations
V. Atluri, Q. Guo

Delegation and Revocation of Obligations - An Extended Analysis
A. Schaad

Implementing Real-Time Update of Access Control Policies
Indrakshi Ray, T. Xin

13:00 - 14:25 Lunch (Arcadin Room)
 
14:30 - 16:00 Session 2: Data Protection Techniques (Gaudí Room)
Defending Against Additive Attacks with Maximal Errors in Watermarking Relational Databases
Y. Li, V. Swarup, S. Jajodia

Performance-Conscious Key Management in Encrypted Databases
H. Hacigumus, S. Mehrotra

Damage Discovery in Distributed Database Systems
Y. Zuo, B. Panda

16:00 - 16:30 Break (Hall)
 
16:30 - 18:00 Session 3: Database Theory and Inference Control (Gaudí Room)
Information flow analysis for file systems and databases using Labels
E. Gudes, L.V. Mancini, F. Parisi-Presicce

Refusal in Incomplete Databases
J. Biskup, T. Weibert

Why Is this User Asking so Many Questions? Explaining Sequences of Queries
A.C. Acar, A. Motro

19:30 -           Antemare Bar
 
20:00 - 22:00 Conference Banquet (Arcadin Room)
 

Tuesday July 27, 2004
 
07:30 - 08:55 Breakfast (Arcadin Room)
 
09:30 - 10:30 Invited talk(Gaudí Room)
 
10:30 - 11:00 Break (Hall)
 
11:00 - 13:00 Session 4: Access Control Design and Management (Gaudí Room)
Policy-based Security Management for Enterprise Systems
R. Mukkamala, L. Chekuri, M. Moharrum, S. Palley

A Pattern System for Access Control
T. Priebe, E. Fernandez, J.I. Mehlau, E. Masovic, G. Pernul

RBAC/MAC Security Analysis and Design for UML
T. Doan, S. Demurjian, C. Phillips, T.C. Ting

A Design for Parameterized Roles
M. Ge, S.L. Osborn

13:00 - 14:00 Lunch (Arcadin Room)
 
14:00 - 14:45 Business Meeting (Gaudí Room)
 
14:45 - 18:15 Excursion to Codorniu's cellar )
 
18:30 - 20:30 visit to Palau Maricel
 
21:00 - 22:30 Dinner (the place depends on the weather)
 

Wednesday July 28, 2004
 
07:30 - 08:55 Breakfast (Arcadin Room)
 
9:30 - 11:00 Session 5: Distributed Systems (Gaudí Room)
Efficient Verification of Delegation in Distributed Group Membership Management
L. Huraj, H. Reiser

Web Resource Usage Control in RSCLP
S. Barker

Securely Distributing Centralized Multimedia Content Utilizing Peer-to-Peer Cooperation
Indrajit Ray, T. Hajek

11:00 - 11:30 Break (Hall)
 
11:30 - 13:00 Panel (Gaudí Room)
 
13:00 - 14:00 Lunch (Arcadin Room)
 
14:00 - 15:30 Session 6: Privacy (Gaudí Room)
On The Damage and Compensation of Privacy Leakage
D. Wang, C. Liau, T. Hsu

An Experimental Study of Distortion-based Techniques for Association Rule Hiding
E. Pontikakis, A. Tsitsonis, V. Verykios

Privacy-Preserving Data Mining in Distributed Environments
J. Zhan, S. Matwin, L.W. Chang

15:30 - 16:00 Break (Hall)
 
16:00 - 17:30 Session 7: Network Protection and Configuration (Gaudí Room)
Configuring Storage Area Networks for Mandatory Security
B. Aziz, S. Foley, J. Herbert, G. Swart

A Framework for Trusted Wireless Sensor Networks
J. S. Park, A. Jain

Secure Bridges: A Means to Conduct Secure Teleconferences over Public Telephones
I. Youn, D. Wijesekera

17:30 - 18:00 Closing Remarks