[Om-announce] DBSec 2015 - Call for Participation
DBSec 2015
dbsec2015 at unimi.it
Fri May 29 16:59:33 CEST 2015
CALL FOR PARTICIPATION
29th Annual IFIP WG 11.3 Working Conference
on Data and Applications Security and Privacy (DBSec 2015)
Fairfax, VA, USA -- July 13-15, 2015
http://dbsec2015.di.unimi.it
REGISTRATION
http://dbsec2015.di.unimi.it/registrations
PROGRAM
Monday, July 13, 2015
---------------------
8:30 - 9:15 Registration
9:15 - 9:30 Opening Remarks
09:45 - 10:30 Keynote speaker: Vipin Swarup, The MITRE Corporation, USA
10:30 - 11:00 Coffee break
11:00 - 12:30 SESSION 1: DATA ANONYMIZATION AND COMPUTATION
MR-RBAT: Anonymizing Large Transaction Datasets Using MapReduce
Neelam Memon, Jianhua Shao
Towards Collaborative Query Planning in Multi-party Database Networks
Mingyi Zhao, Peng Liu, Jorge Lobo
Privacy-Preserving Range Queries from Keyword Queries
Giovanni Di Crescenzo, Abhrajit Ghosh
12:30 - 14:00 Lunch
14:00 - 15:30 SESSION 2: ACCESS CONTROL AND AUTHORIZATION
An Administrative Model for Relationship-Based Access Control
Scott D. Stoller
Migrating from DAC to RBAC
Emre Uzun, David Lorenzi, Vijayalakshmi Atluri, Jaideep Vaidya, Shamik
Sural
Assisting the Deployment of Security-Sensitive Workflows by Finding
Execution Scenarios
Daniel R. dos Santos, Silvio Ranise, Luca Compagna, Serena E. Ponta
15:30 - 16:00 Coffee break
16:00 - 17:30 SESSION 3: USER PRIVACY
Privacy Preserving Record Matching Using Automated Semi-Trusted Broker
Ibrahim Lazrig, Tarik Moataz, Indrajit Ray, Indrakshi Ray, Toan Ong,
Michael Kahn, Frederic Cuppens, Nora Cuppens
Outsourceable Privacy-Preserving Power Usage Control in a Smart Grid
Hu Chun, Kui Ren, Wei Jiang
Privacy-Preserving Public Transport Ticketing System
Milica Milutinovic, Koen Decroix, Vincent Naessens, Bart De Decker
17:30 - 18:00 Business Meeting
18:00 Reception
+++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
++++
Tuesday, July 14, 2015
----------------------
09:30 - 10:30 Keynote speaker: Sara Foresti, Universita' degli Studi di
Milano, Italy
10:30 - 11:00 Coffee break
11:00 - 12:30 SESSION 4: AUTHENTICATION AND INFORMATION INTEGRATION
Expiration and Revocation of Keys for Attribute-based Signatures
Stephen R. Tate, Roopa Vishwanathan
Detecting Opinion Spammer Groups through Community Discovery and Sentiment
Analysis
Euijin Choo, Ting Yu, Min Chi
Constructing Inference-Proof Belief Mediators
Joachim Biskup, Cornelia Tadros
12:30 - 14:00 Lunch
14:00 - 15:00 SESSION 5: PRIVACY AND TRUST
Personalized Composition of Trustful Reputation Systems
Johannes Sanger, Christian Richthammer, Andre Kremser, Guenther Pernul
FamilyID: A Hybrid Approach to Identify Family Information from Microblogs
Jamuna Gopal, Shu Huang, Bo Luo
Sanitization of Call Detail Records via Differentially-private Bloom
Filters
Mohammad Alaggan, Sebastien Gambs, Stan Matwin, Mohammed Tuhin
15:00 - 16:00 SESSION 6: ACCESS CONTROL AND USAGE POLICIES
Protecting Personal Data: Access Control for Privacy Preserving Perimeter
Protection System
Annanda Thavymony Rath, Jean-Noel Colin
Integrating Attributes into Role-Based Access Control
Qasim Mahmood Rajpoot, Christian Damsgaard Jensen, Ram Krishnan
Automated Translation of End User Policies for Usage Control Enforcement
Prachi Kumari, Alexander Pretschner
16:00 - 16:30 Coffee break
17:30 Social Event and Dinner
+++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
++++
Wednesday, July 15, 2015
------------------------
9:00 - 10:30 SESSION 7: NETWORK AND INTERNET SECURITY
Defensive Resource Allocations with Security Chokepoints in IPv6 Networks
Assane Gueye, Peter Mell, Richard Harang, Richard J. La
A Topology based Flow Model for Computing Domain Reputation
Igor Mishsky, Nurit Gal-Oz, Ehud Gudes
FPGuard: Detection and Prevention of Browser Fingerprinting
Amin FaizKhademi, Mohammad Zulkernine, Komminist Weldemariam
10:30 - 11:00 Coffee break
11:00 - 12:30 SESSION 8: INFORMATION FLOW AND INFERENCE
Stream Processing with Secure Information Flow Constraints
Indrakshi Ray, Raman Adaikkalavan, Xing Xie, Rose Gamble
Optimal Constructions for Chain-based Cryptographic Enforcement of
Information Flow Policies
Jason Crampton, Naomi Farley, Gregory Gutin, Mark Jones
Inference Leakage Detection for Authorization Policies over RDF Data
Tarek Sayah, Emmanuel Coquery, Romuald Thion, Mohand-Said Hacid
12:30 - 14:00 Lunch
MORE INFORMATION
Additional information about the conference can be found at
http://dbsec2015.di.unimi.it
****************
Per destinare il 5x1000 all'Universita' degli Studi di Milano: indicare nella dichiarazione dei redditi il codice fiscale 80012650158.
http://www.unimi.it/13084.htm?utm_source=firmaMail&utm_medium=email&utm_content=linkFirmaEmail&utm_campaign=5xmille
More information about the Om-announce
mailing list