19th Annual IFIP WG 11.3 Working Conference on Data and Applications Security
Nathan Hale Inn, University of Connecticut, Storrs, CT, U.S.A., August 7-10, 2005
Call for Papers
[
pdf
] |
Submissions
|
Program
|
Registration
Program
Monday August 8, 2005
09:00 - 09:15 Welcome and Opening
T.C. Ting, Sushil Jajodia, and Duminda Wijesekera
09:30 - 10:30 Invited talk
(
Chair: Sushil Jajodia
)
Divesh Srivastava (AT & T)
10:30 - 11:00 Break
11:00 - 12:30 Session 1: Policy
(
Chair: Ting Yu
)
Towards Privacy-enhanced Authorization Policies and Languages
C.A Ardagna, E. Damiani, S. De Capitani di Vimercati, P. Samarati
Revocation of Obligations
Andreas Schaad
Role Slices: A notation for RBAC Permission Assignment and Enforcement
J. A. Pavlich-Mariscal, T. Doan, L. Michel, S.A. Demurjian, and T. C. Ting
12:30 - 2:00 Lunch
2:00 - 3:30 Session 2: Handling Encrypted Data
(
Chair: Vijay Atluri
)
Designing Secure Indexes for Encrypted Databases
Erez Shmueli, Ronen Waisenberg, Yuval Elovici, and Ehud Gudes
Efficiency and Security Trade-off in Supporting Range Queries on Encrypted Databases
Jun Li and Edward R. Omiecinski
Verified Query Results from Hybrid Authentication Trees
Glen Nuckolls
3:30 - 4:00 Break
4:00 - 5:30 Panel: Data and Application Security: Looking Forward from 1987
Moderators: Carl Landwehr and David Spooner
Panel Members: Tom Haigh, Richard Kemmerer, T.Y. Lin, Ravi Sandhu, and others
Tuesday August 9, 2005
9:00 - 10:30 Session 3: Networks and Protocols
(
Chair: Rajni Goel
)
Multilevel Secure Teleconferences over Public Switched Telephone Networks
Inja Youn, Csilla Farkas, and Bhavani Thuraisingham
Security of Two-party Secure Computation
Yi-Ting Chiang, Tse-Sheng Hsu, Churn Jung Liau, and Da-Wei Wang
Reliable Scheduling of Advanced Transactions
Tai Xin, Yajie Zhu, and Indrakshi Ray
10:30 - 11:00 Break
11:00 - 12:30 Session 4: Privacy
(
Chair: Csilla Farkas
)
Privacy-preserving Decision Trees over Vertically Partitioned Data
Jaideep Vaidya and Chris Clifton
Privacy-preserving Collaborative Association Rule Mining
Justin Zhan, Stan Matwin, LiWu Chang
Privacy-preserving Distributed k-anonymity
Wei Jiang and Chris Clifton
12:30 - 2:00 Lunch
2:00 - 2:30 Business Meeting
2:30 - Area Tour
Wednesady August 10, 2005
9:00 - 10:30 Session 5: Firewalls and Intrusion Detection
(
Chair: David Spooner
)
Towards Database Firewalls
Kun Bai, Hai Wang, and Peng Liu
Complete Redundancy Detection in Firewalls
Alex X. Liu and Mohomed G. Gouda
A Comprehensive Approach to Anomaly Detection in Relational Databases
Adrian Spalka and Jan Lehnhardt
10:30 - 12:30 Break
11:00 - 12:30 Session 6: Web Security
(
Chair: Sylvia Osborn
)
Authorization Architecture for Web Services
Sarath Indrakanti, Vijay Varadharajan, and Michael Hitchens
Secure Model Management Operations for the Web
Guanglei Song, Kang Zhang, Bhavani Thuraisingham, and Jun Kong
Facilitating Automatic Resource Sharing among Ad-hoc Dynamic Coalitions
Janice Warner, Vijaylakshmi Atluri, and Ravi Mukkamala
12:30 - 2:00 Lunch
2:00 - 3:30 Session 7: Secure Software and Management
(
Chair: Joon Park
)
Secure Mediation with Mobile Code
Joachim Biskup, Barbara Sprick, and Lena Wiese
Security Vulnerabilities in Software Systems: A Quantitative Perspective
O. H. Alhazmi, Y. K. Malaiya and I. Ray
Trading Off Security in a Service Oriented Architecture
Garret Swart, Benjamin Aziz, Simon Foley, and John Herbert
3:30 - 4:00 Break
4:00 - 5:30 Session 8: : Identity Management and Encryption
(
Chair: Indrakshi Ray
)
Towards Secure Identity Management Systems
Joon S Park and Harish S. Krishnan
Security Issues in Querying Encrypted Data
M. Kantracioglu and C. Clifton
Blind custodians: A Database Service Architectures that Supports Privacy without Encryption
Amihai Motro and Francesco Parisi-Presicce