Date |
Event |
Time |
June 7, 2006 |
Registration |
8:00 – 8:30 |
Welcome Remarks |
8:30 – 8:40 |
Session 1: Access Control
Technology
Chair : Vijay Atluri
|
8:40 – 10:40 |
Access Control, Confidentiality and Privacy for Video Surveillance
Databases Bhavani Thuraisingham,
Gal Lavee, Elisa Bertino, Jianping Fan
The University of Texas at Dallas, Purdue
University, University of North Carolina at Charlotte
|
|
Key Management for Non-Tree Access Hierarchies
Mikhail J. Atallah, Marina Blanton, Keith B.
Frikken
Purdue University
|
|
PRIMA: Policy-Reduced Integrity Measurement Architecture
Trent Jaeger, Reiner Sailer, Umesh Shankar
Pennsylvania State University, IBM T.J.
Watson Research Center, University of California at Berkeley
|
|
On Classifying Access Control Implementations for Distributed
Systems Kevin Kane, James C. Browne
The University of Texas at Austin
|
|
Coffee Break |
10:40 – 11:00 |
Session
2: Trust-Based Authorization
Chair - Elena Ferrari
|
11:00 – 12:30 |
Traust: A Trust Negotiation-Based Authorization Service
for Open Systems Adam J. Lee,
Marianne Winslett, Jim Basney, Von Welch
University of Illinois at Urbana-Champaign
|
|
TrustBAC: Integrating Trust Relationships
into the RBAC Model for Access Control in Open Systems
Sudip Chakraborty and Indrajit Ray
Colorado State University
|
|
Integrating Presence Inference into Trust Management for
Ubiquitous Systems Jun Noda, Mie
Takashi, Itaru Hosomi, Hisashi Mouri, Yoshiaki Takata, and Hiroyuki
Seki
NEC Corporation and Nara Institute of Science
and Technology
|
|
Lunch |
12:30 – 2:00 |
Panel: Security in Enterprise Resource
Planning Systems and Service-Oriented Architectures |
2:00 – 3:30
|
Coffee Break |
3:30 – 3:50 |
Session
3: Delegation
Chair - Dongwan Shin
|
3:50 – 5:20 |
Trust Management with Delegation in Grouped Peer-to-Peer
Communities Ajay Ravichandran
and Jong P. Yoon
University of Louisiana
|
|
Fine-grained Role-based Delegation in Presence of Hybrid
Role Hierarchy James B.D. Joshi
and Elisa Bertino
University of Pittsburgh and Purdue University
|
|
Delegation in the Role Graph Model He
Wang and Sylvia L. Osborn
University of Western Ontario
|
|
June 8, 2006
|
Registration |
8:00 – 8:30 |
Session
4: Access Control Model
Chair - Reiner Sailer
|
8:30 – 10:30 |
Systematic Control and Management of Data Integrity
Ji-Won Byun, Yonglak Sohn, Elisa Bertino
Purdue University and Seokyeong University
|
|
The Secondary and Approximate Authorization Model and its
Application to Bell-LaPadula Policies Jason
Crampton, Wing Leung, Konstantin Beznosov
Royal Holloway, University of London and
University of British Columbia
|
|
Secure Resource Description Framework: an Access Control
Model Amit Jain and Csilla Farkas
University of South Carolina
|
|
Constraint Generation for Separation of Duty
Hong Chen and Ninghui Li
Purdue University
|
|
Coffee Break |
10:30 – 10:50 |
Session
5: Access Control Analysis
Chair - Jason Crampton
|
10:50 – 12:50 |
A Model-Checking Approach to Analyzing Organisational Controls
in a Loan Origination Process Andreas
Schaad and Karsten Sohr
SAP Labs France and Universitat Bremen
|
|
Information Flow Property Preserving Transformation of UML
Interaction Diagrams Frederik
Seehusen and Ketil Stolen
University of Oslo
|
|
Towards Reasonability Properties for Access-Control Policy
Languages Michael Carl Tschantz
and Shriram Krishnamurthi
Brown University
|
|
Data-Centric Security: Role Analysis and Role Typestates
Vugranam C. Sreedhar
IBM T.J. Watson Research Center
|
|
Lunch |
12:50 – 2:20 |
Industry Presentations/Panel
- Identity Management and Compliance
Axel Kern, Beta Systems Software AG, Germany
- The Policy Machine: An Emerging Access Control Standard
David Ferraiolo, National Institute of Standards
and Technology
- The OneHealthPort Trusted Community: Simplifying Access
to Information for Healthcare
Ravi Sandhu, TriCipher and George Mason University
|
2:20 – 3:50 |
Coffee Break |
3:50 – 4:10 |
Industry Presentations/Panel
"Industry and Academic Panel on
Future Directions in Access Control"
|
4:10 – 5:40 |
Dinner/Social Event |
|
June 9, 2006
|
Steering Committee Meeting |
7:30 – 8:30 |
Registration |
8:00 – 8:30 |
Session
6: Secure Collaboration
Chair - Bhavani Thuraisingham
|
8:30 – 10:00 |
A Usage-based Authorization Framework for Collaborative
Computing Systems Xinwen Zhang,
Masayuki Nakae, Michael J. Covington, Ravi Sandhu
George Mason University, NEC Corporation,
Intel Corporation
|
|
Inter-Instance Authorization Constraints
for Secure Workflow Management Janice
Warner and Vijayalakshmi Atluri
Rutgers University
|
|
Role-based Access Management for Ad-hoc Collaboration
Jing Jin and Gail-Joon Ahn
University of North Carolina at Charlotte
|
|
Coffee Break |
10:00 – 10:20 |
Session 7: Information Sharing
Chair - Csilla Farkas |
10:20 – 12:20 |
Redirection Policies for Mission-Based Information Sharing
David Keppler, Vipin Swarup, Sushil
Jajodia
The MITRE Corporation
|
|
XACML Policy Integration Algorithms P.
Mazzoleni, E. Bertino, B. Crispo, S. Sivasubramanian
University of Milan, Purdue University,
Vrije Universiteit, University of Trento
|
|
Supporting Authorization Query and Inter-domain Role Mapping
in Presence of Hybrid Role Hierarchy Siqing
Du and James B.D. Joshi
University of Pittsburgh
|
|
Semantic Access Control for Information Interoperation
Chi-Chun Pan, Prasenjit Mitra, Peng Liu
The Pennsylvania State University
|
|
Closing Remarks |
12:20 – 12:30 |