CALL FOR PARTICIPATION
**********************************************************************
24th Annual IFIP WG 11.3 Working Conference
on Data and Applications Security and Privacy (DBSec 2010)
Rome, Italy -- June 21-23, 2010
http://dbsec2010.dti.unimi.it
**********************************************************************
ABOUT THE CONFERENCE
DBSec is an annual international conference covering research in data and
applications security and privacy. The conference seeks submissions from
academia, industry, and government presenting novel research on all theoretical
and practical aspects of data protection, privacy, and applications security.
The conference will be a 3-day event featuring technical presentations of 18
full papers and 11 short papers. It also includes a keynote speech and a panel.
The 24th Annual IFIP WG 11.3 Working Conference on Data and Applications
Security and Privacy (DBSec 2010) will be held in Rome,
Italy.
REGISTRATION
Registration information is available at
https://dbsec2010.dti.unimi.it/registration
PROGRAM
Monday, June 21, 2010
---------------------
8:30 - 9:10 Registration
9:15 - 9.30 Opening Remarks
9:30 - 10:30 Keynote speaker: Prof. Francesco Pizzetti,
President of the Italian Data Protection Authority
10:30 - 11:00 Coffee break
11:00 - 12:30 QUERY AND DATA PRIVACY
- Generalizing PIR for Practical Private Retrieval of Public Data
(Shiyuan Wang, Divyakant Agrawal, and Amr El Abbadi)
- A Logic of Privacy
(Steve Barker and Valerio Genovese)
- Understanding Privacy Risk of Publishing Decision Trees
(Zutao Zhu and Wenliang Du)
12:30 - 14:00 Lunch
14:00 - 15:30 DATA PROTECTION
- Secure Outsourcing of DNA Searching via Finite Automata
(Marina Blanton and Mehrdad Aliasgari)
- A Labelling System for Derived Data Control
(Enrico Scalavino, Vaibhav Gowadia, and Emil C. Lupu)
- On the Identification of Property Based Generalizations in Microdata
Anonymizations
(Rinku Dewri, Indrajit Ray, Indrakshi Ray, and Darrell Whitley)
15:30 - 16:00 Coffee break
16:00 - 17:15 ACCESS CONTROL - 1
- An Access Control Model for Web Databases
(Ahlem Bouchahda-Ben Tekaya, Nhan Le Thanh, Adel Bouhoula,
and Faten Labbene-Ayachi)
- Modelling Dynamic Access Control Policies for Web-based
Collaborative Systems
(Hasan Qunoo and Mark Ryan)
- Evaluating the Risk of Adopting RBAC Roles
(Alessandro Colantonio, Roberto Di Pietro, Alberto Ocello,
and Nino Vincenzo Verde)
- Preserving Integrity and Confidentiality of a Directed Acyclic
Graph Model of Provenance
(Amril Syalim, Takashi Nishide, and Kouichi Sakurai)
- When ABE Meets RSS
(Yu Chen, Hyun Sung Kim, Jianbin Hu, and Zhong Chen)
17:15 - 17:45 Business meeting
18:30 Reception
______________________________________________________________________
Tuesday, June 22, 2010
----------------------
9:00 - 10:30 ACCESS CONTROL - 2
- Role Mining in the Presence of Noise
(Jaideep Vaidya, Vijayalakshmi Atluri, Qi Guo, and Haibing Lu)
- Distributed and Secure Access Control in P2P Databases
(Angela Bonifati, Ruilin Liu, and Hui (Wendy) Wang)
- Constructing Key Assignment Schemes from Chain Partitions
(Jason Crampton, Rosli Daud, and Keith M. Martin)
10:30 - 11:00 Coffee break
11:00 - 12:30 DATA CONFIDENTIALITY AND QUERY VERIFICATION
- fQuery: SPARQL Query Rewriting to Enforce Data Confidentiality
(Said Oulmakhzoune, Nora Cuppens-Boulahia, Frederic Cuppens,
and Stephane Morucci)
- Efficient Inference Control for Open Relational Queries
(Joachim Biskup, Sven Hartmann, Sebastian Link,
and Jan-Hendrik Lochner)
- Query Racing: Fast Completeness Certification of Query Results
(Bernardo Palazzi, Maurizio Pizzonia, and Stefano Pucacco)
12:30 - 14:00 Lunch
14:00 - 15:00 Panel:
Assured Information Sharing: Techniques and Challenges
15:20 Social event: Tour of Imperial Rome
(Arch of Constantine, Colosseum, the Roman Forum,
Capitol Square, Piazza Venezia)
20:00 Social dinner
______________________________________________________________________
Wednesday, June 23, 2010
------------------------
9:00 - 10:30 POLICY DEFINITION AND ENFORCEMENT
- Mining Likely Properties of Access Control Policies via
Association Rule Mining
(JeeHyun Hwang, Tao Xie, Vincent Hu, and Mine Altunay)
- Scalable and Efficient Reasoning for Enforcing Role-Based
Access Control
(Tyrone Cadenhead, Murat Kantarcioglu,
and Bhavani Thuraisingham)
- Enforcing Request Integrity in Web Applications
(Karthick Jayaraman, Grzegorz Lewandowski, Paul G. Talaga,
and Steve J. Chapin)
10:30 - 11:00 Coffee break
11:00 - 12:30 TRUST AND IDENTITY MANAGEMENT
- Using Trust-Based Information Aggregation for Predicting Security
Level of Systems
(Siv Hilde Houmb, Sudip Chakraborty, Indrakshi Ray,
and Indrajit Ray)
- Modelling Dynamic Trust with Property Based Attestation in Trusted
Platforms
(Aarthi Nagarajan, Vijay Varadharajan, Michael Hitchens,
and Saurabh Arora)
- Towards Privacy-enhancing Identity Management in Mashup-providing
Platforms
(Jan Zibuschka, Matthias Herbert, and Heiko Rossnagel)
12:30 - 14:00 Lunch
14:00 - 15:30 IDENTITY MANAGEMENT, SPAM DETECTION, AND AUTHENTICATION
- PriMan: A Privacy-Preserving Identity Framework
(Kristof Verslype, Pieter Verhaeghe, Jorn Lapon, Vincent Naessens,
and Bart De Decker)
- Detecting Spam Bots in Online Social Networking Sites:
A Machine Learning Approach
(Alex Hai Wang)
- Authentication Assurance Level Taxonomies for Smart Identity Token
Deployments - A New Approach
(Ramaswamy Chandramouli)
- Performance Evaluation of Non-Parallelizable Client Puzzles for
Defeating DoS Attacks in Authentication Protocols
(Suratose Tritilanunt)
- Secure Location Verification
(Georg T. Becker, Sherman C. Lo, David S. De Lorenzo,
Per K. Enge, and Christof Paar)
- A Secure RFID Ticket System For Public Transport
(Kun Peng and Feng Bao)
15:30 Farewell
MORE INFORMATION
Additional information about the conference can be found at
http://dbsec2010.dti.unimi.it
_______________________________________________
Tccc mailing list
Tccc@lists.cs.columbia.edu
https://lists.cs.columbia.edu/cucslists/listinfo/tccc
No comments:
Post a Comment