[FM-India] DBSec 2015 - Call for Participation

DBSec 2015 dbsec2015 at unimi.it
Thu Jun 18 21:41:55 IST 2015


CALL FOR PARTICIPATION

29th Annual IFIP WG 11.3 Working Conference
on Data and Applications Security and Privacy (DBSec 2015)
Fairfax, VA, USA -- July 13-15, 2015
http://dbsec2015.di.unimi.it


REGISTRATION

http://dbsec2015.di.unimi.it/registrations


PROGRAM

Monday, July 13, 2015
---------------------

8:30 - 9:15 Registration

9:15 - 9:30 Opening Remarks

09:45 - 10:30 Keynote speaker: Vipin Swarup, The MITRE Corporation, USA

10:30 - 11:00 Coffee break

11:00 - 12:30 SESSION 1: DATA ANONYMIZATION AND COMPUTATION

MR-RBAT: Anonymizing Large Transaction Datasets Using MapReduce
Neelam Memon, Jianhua Shao

Towards Collaborative Query Planning in Multi-party Database Networks
Mingyi Zhao, Peng Liu, Jorge Lobo

Privacy-Preserving Range Queries from Keyword Queries
Giovanni Di Crescenzo, Abhrajit Ghosh

12:30 - 14:00 Lunch

14:00 - 15:30 SESSION 2: ACCESS CONTROL AND AUTHORIZATION

An Administrative Model for Relationship-Based Access Control
Scott D. Stoller

Migrating from DAC to RBAC
Emre Uzun, David Lorenzi, Vijayalakshmi Atluri, Jaideep Vaidya, Shamik Sural

Assisting the Deployment of Security-Sensitive Workflows by Finding
Execution Scenarios
Daniel R. dos Santos, Silvio Ranise, Luca Compagna, Serena E. Ponta

15:30 - 16:00 Coffee break

16:00 - 17:30 SESSION 3: USER PRIVACY

Privacy Preserving Record Matching Using Automated Semi-Trusted Broker
Ibrahim Lazrig, Tarik Moataz, Indrajit Ray, Indrakshi Ray, Toan Ong,
Michael Kahn, Frederic Cuppens, Nora Cuppens

Outsourceable Privacy-Preserving Power Usage Control in a Smart Grid
Hu Chun, Kui Ren, Wei Jiang

Privacy-Preserving Public Transport Ticketing System
Milica Milutinovic, Koen Decroix, Vincent Naessens, Bart De Decker

17:30 - 18:00 Business Meeting

18:00 Reception

+++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

Tuesday, July 14, 2015
----------------------

09:30 - 10:30 Keynote speaker: Sara Foresti, Universita' degli Studi di Milano, Italy

10:30 - 11:00 Coffee break

11:00 - 12:30 SESSION 4: AUTHENTICATION AND INFORMATION INTEGRATION

Expiration and Revocation of Keys for Attribute-based Signatures
Stephen R. Tate, Roopa Vishwanathan

Detecting Opinion Spammer Groups through Community Discovery and Sentiment
Analysis
Euijin Choo, Ting Yu, Min Chi

Constructing Inference-Proof Belief Mediators
Joachim Biskup, Cornelia Tadros

12:30 - 14:00 Lunch

14:00 - 15:00 SESSION 5: PRIVACY AND TRUST

Personalized Composition of Trustful Reputation Systems
Johannes Sanger, Christian Richthammer, Andre Kremser, Guenther Pernul

FamilyID: A Hybrid Approach to Identify Family Information from Microblogs
Jamuna Gopal, Shu Huang, Bo Luo

Sanitization of Call Detail Records via Differentially-private Bloom Filters
Mohammad Alaggan, Sebastien Gambs, Stan Matwin, Mohammed Tuhin

15:00 - 16:00 SESSION 6: ACCESS CONTROL AND USAGE POLICIES

Protecting Personal Data: Access Control for Privacy Preserving Perimeter
Protection System
Annanda Thavymony Rath, Jean-Noel Colin

Integrating Attributes into Role-Based Access Control
Qasim Mahmood Rajpoot, Christian Damsgaard Jensen, Ram Krishnan

Automated Translation of End User Policies for Usage Control Enforcement
Prachi Kumari, Alexander Pretschner

16:00 - 16:30 Coffee break

17:30 Social Event and Dinner

+++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

Wednesday, July 15, 2015
------------------------

9:00 - 10:30 SESSION 7: NETWORK AND INTERNET SECURITY

Defensive Resource Allocations with Security Chokepoints in IPv6 Networks
Assane Gueye, Peter Mell, Richard Harang, Richard J. La

A Topology based Flow Model for Computing Domain Reputation
Igor Mishsky, Nurit Gal-Oz, Ehud Gudes

FPGuard: Detection and Prevention of Browser Fingerprinting
Amin FaizKhademi, Mohammad Zulkernine, Komminist Weldemariam

10:30 - 11:00 Coffee break

11:00 - 12:30 SESSION 8: INFORMATION FLOW AND INFERENCE

Stream Processing with Secure Information Flow Constraints
Indrakshi Ray, Raman Adaikkalavan, Xing Xie, Rose Gamble

Optimal Constructions for Chain-based Cryptographic Enforcement of
Information Flow Policies
Jason Crampton, Naomi Farley, Gregory Gutin, Mark Jones

Inference Leakage Detection for Authorization Policies over RDF Data
Tarek Sayah, Emmanuel Coquery, Romuald Thion, Mohand-Said Hacid

12:30 - 14:00 Lunch


MORE INFORMATION

Additional information about the conference can be found at
http://dbsec2015.di.unimi.it
****************
Per destinare il 5x1000 all'Universita' degli Studi di Milano: indicare nella dichiarazione dei redditi il codice fiscale 80012650158.

http://www.unimi.it/13084.htm?utm_source=firmaMail&utm_medium=email&utm_content=linkFirmaEmail&utm_campaign=5xmille



More information about the FMIndia mailing list