[Om-announce] [DBSec 2013] Call for Participation (Early Registration Deadline Extended to June 14)
Claudio Agostino Ardagna (claudio.ardagna)
claudio.ardagna at unimi.it
Mon Jun 3 16:32:39 CEST 2013
[Apologies if you receive multiple copies of this message]
CALL FOR PARTICIPATION
***********************************************************************
27th Annual IFIP WG 11.3 Working Conference on Data and
Applications Security and Privacy (DBSec '13)
July 15-17, 2013, Rutgers University, Newark, NJ, USA
http://dbsec2013.business.rutgers.edu/
***********************************************************************
ABOUT THE CONFERENCE
DBSec is an annual international conference covering research in data and
applications security and privacy. The conference seeks submissions from
academia, industry, and government presenting novel research on all theoretical
and practical aspects of data protection, privacy, and applications security.
The conference will be a 3-day event featuring technical
presentations of 16 full papers and 6 short papers. It also includes
two keynote speeches.
The 27th Annual IFIP WG 11.3 Working Conference on Data and Applications
Security and Privacy (DBSec 2013) will be held in Newark, NJ, USA.
REGISTRATION
Registration information is available at
http://dbsec2013.business.rutgers.edu/registration.htm
PROGRAM
Monday, July 15, 2013
---------------------
8:00 Registration
8:00 - 9:00 Breakfast
9:00 - 9.30 Welcome
9:30 - 10:30 Keynote speaker: H. Vincent Poor, Princeton University
"Privacy-Utility Tradeoffs for Data Sources, with
Applications in Smart Grid"
Chair: Jaideep Vaidya
10:30 - 11:00 Coffee break
11:00 - 12:30 PRIVACY I (Chair: Basit Shafiq)
- Extending Loose Associations to Multiple Fragments
(Sabrina De Capitani Di Vimercati, Sara Foresti, Sushil Jajodia,
Giovanni Livraga, Stefano Paraboschi and Pierangela Samarati)
- Database Fragmentation with Encryption: Under Which Semantic
Constraints and A Priori Knowledge Can Two Keep a Secret?
(Joachim Biskup and Marcel Preuß)
- Real-Time Publication of Multi-Dimensional Time-Series with
Differential Privacy
(Liyue Fan, Li Xiong and Vaidy Sunderam)
12:30 - 13:30 Lunch
13:30 - 15:00 ACCESS CONTROL (Chair: Joachim Biskup)
- Policy Analysis for Administrative Role Based Access Control
without Separate Administration
(Ping Yang, Mikhail Gofman and Zijiang Yang)
- Toward Mining of Temporal Roles
(Barsha Mitra, Shamik Sural, Vijay Atluri and Jaideep Vaidya)
- Towards User-Oriented RBAC Model
(Haibing Lu, Yuan Hong, Yanjiang Yang, Lian Duan and Nazia Badar)
15:00 - 15:30 Coffee break
15:30 - 16:30 CLOUD COMPUTING (Chair: Meng Yu)
- Hypervisor Event Logs as a Source of Consistent Virtual
Machine Evidence for Forensic Cloud Investigations
(Sean Thorpe)
- TerraCheck: Verification of Dedicated Cloud Storage
(Zhan Wang, Kun Sun, Sushil Jajodia and Jiwu Jing)
______________________________________________________________________
Tuesday, July 16, 2013
----------------------
8:00 Registration
8:00 - 9:00 Breakfast
9:00 - 10:00 Keynote speaker: Johannes Gehrke, Cornell University
"Research Questions in Data Privacy and Security for
App Ecosystems"
Chair: Soon Ae Chun
10:00 - 10:30 Coffee break
10:30 - 12:00 PRIVACY II (Chair: Florian Kerschbaum)
- Fair Private Set Intersection with a Semi-trusted Arbiter
(Changyu Dong, Liqun Chen, Jan Camenisch and Giovanni Russello)
- Bloom Filter Bootstrap: Privacy-Preserving Estimation of the Size
of an Intersection
(Hiroaki Kikuchi and Jun Sakuma)
- Using Safety Constraint for Transactional Dataset Anonymization
(Bechara Al Bouna, Chris Clifton and Qutaibah Malluhi)
12:00 - 13:00 Lunch
13:00 - 14:30 DATA OUTSOURCING (Chair: Sabrina De Capitani di Vimercati)
- Practical Immutable Signature Bouquets (PISB) for Authentication
and Integrity in Outsourced Databases
(Attila Yavuz)
- Optimal Re-Encryption Strategy for Joins in Encrypted Databases
(Florian Kerschbaum, Martin Härterich, Patrick Grofig,
Mathias Kohler, Andreas Schaad, Axel Schröpfer and
Walter Tighzert)
- Access Control and Query Verification for Untrusted Databases
(Rohit Jain and Sunil Prabhakar)
14:30 - 15:00 Coffee Break
15:00 - 16:00 MOBILE COMPUTING (Chair: Lingyu Wang)
- Quantitative Security Risk Assessment of Android Permissions
and Applications
(Yang Wang, Jun Zheng, Chen Sun and Srinivas Mukkamala)
- A Model for Trust-based Access Control and Delegation in
Mobile Clouds
(Indrajit Ray, Dieudonne Mulamba, Indrakshi Ray and Keesook J. Han)
16:00 - 17:00 IFIP 11.3 Business Meeting
______________________________________________________________________
Wednesday, July 17, 2013
------------------------
8:00 Registration
8:00 - 9:00 Breakfast
9:00 - 10:00 SHORT PAPER I (Chair: Indrajit Ray)
- Result Integrity Verification of Outsourced Frequent Itemset
Mining
(Boxiang Dong, Ruilin Liu and Hui Wendy Wang)
- An Approach to Select Cost-Effective Risk Countermeasures
Exemplified in CORAS
(Le Minh Sang Tran, Bjørnar Solhaug and Ketil Stølen)
- Enhance Biometric Database Privacy: Defining Privacy-Preserving
Drawer Size Standard for the Setbase
(Benjamin Justus, Frédéric Cuppens, Nora Cuppens, Julien Bringer,
Hervé Chabanne and Olivier Cipiere)
10:00 - 10:30 Coffee break
10:30 - 11:30 SHORT PAPER II (Chair: Shamik Sural)
- Rule Enforcement with Third Parties in Secure Cooperative
Data Access
(Meixing Le, Krishna Kant and Sushil Jajodia)
- Unlinkable Content Playbacks in a Multiparty DRM System
(Ronald Petrlic and Stephan Sekula)
- Analysis of TRBAC with Dynamic Temporal Role Hierarchies
(Emre Uzun, Vijayalakshmi Atluri, Jaideep Vaidya
and Shamik Sural)
MORE INFORMATION
Additional information about the conference can be found at
http://dbsec2013.business.rutgers.edu
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://openmath.org/pipermail/om-announce/attachments/20130603/4521d099/attachment.html>
More information about the Om-announce
mailing list