About
Accepted Papers
Advance Program
Call for Papers
Important Dates
Submission Site
Program Committee
Officers
Registration
Location
Miscellaneous
Since 1995

Maintained by

SACMAT 06

Date
Event
Time
June 7, 2006 Registration 8:00 – 8:30
Welcome Remarks 8:30 – 8:40

Session 1: Access Control Technology

Chair : Vijay Atluri

8:40 – 10:40
Access Control, Confidentiality and Privacy for Video Surveillance Databases

Bhavani Thuraisingham, Gal Lavee, Elisa Bertino, Jianping Fan
The University of Texas at Dallas, Purdue University, University of North Carolina at Charlotte

 
Key Management for Non-Tree Access Hierarchies

Mikhail J. Atallah, Marina Blanton, Keith B. Frikken
Purdue University

 
PRIMA: Policy-Reduced Integrity Measurement Architecture

Trent Jaeger, Reiner Sailer, Umesh Shankar
Pennsylvania State University, IBM T.J. Watson Research Center, University of California at Berkeley

 
On Classifying Access Control Implementations for Distributed Systems

Kevin Kane, James C. Browne
The University of Texas at Austin

 
Coffee Break 10:40 – 11:00

Session 2: Trust-Based Authorization

Chair - Elena Ferrari

11:00 – 12:30
Traust: A Trust Negotiation-Based Authorization Service for Open Systems

Adam J. Lee, Marianne Winslett, Jim Basney, Von Welch
University of Illinois at Urbana-Champaign

 
TrustBAC: Integrating Trust Relationships into the RBAC Model for Access Control in Open Systems

Sudip Chakraborty and Indrajit Ray
Colorado State University

 
Integrating Presence Inference into Trust Management for Ubiquitous Systems

Jun Noda, Mie Takashi, Itaru Hosomi, Hisashi Mouri, Yoshiaki Takata, and Hiroyuki Seki
NEC Corporation and Nara Institute of Science and Technology

 
Lunch 12:30 – 2:00
Panel: Security in Enterprise Resource Planning Systems and Service-Oriented Architectures 2:00 – 3:30
Coffee Break 3:30 – 3:50

Session 3: Delegation

Chair - Dongwan Shin

3:50 – 5:20
Trust Management with Delegation in Grouped Peer-to-Peer Communities

Ajay Ravichandran and Jong P. Yoon
University of Louisiana

 
Fine-grained Role-based Delegation in Presence of Hybrid Role Hierarchy

James B.D. Joshi and Elisa Bertino
University of Pittsburgh and Purdue University

 
Delegation in the Role Graph Model

He Wang and Sylvia L. Osborn
University of Western Ontario

 
June 8, 2006
Registration 8:00 – 8:30

Session 4: Access Control Model

Chair - Reiner Sailer

8:30 – 10:30
Systematic Control and Management of Data Integrity

Ji-Won Byun, Yonglak Sohn, Elisa Bertino
Purdue University and Seokyeong University

 
The Secondary and Approximate Authorization Model and its Application to Bell-LaPadula Policies

Jason Crampton, Wing Leung, Konstantin Beznosov
Royal Holloway, University of London and University of British Columbia

 
Secure Resource Description Framework: an Access Control Model

Amit Jain and Csilla Farkas
University of South Carolina

 
Constraint Generation for Separation of Duty

Hong Chen and Ninghui Li
Purdue University

 
Coffee Break 10:30 – 10:50

Session 5: Access Control Analysis

Chair - Jason Crampton

10:50 – 12:50
A Model-Checking Approach to Analyzing Organisational Controls in a Loan Origination Process

Andreas Schaad and Karsten Sohr
SAP Labs France and Universitat Bremen

 
Information Flow Property Preserving Transformation of UML Interaction Diagrams

Frederik Seehusen and Ketil Stolen
University of Oslo

 
Towards Reasonability Properties for Access-Control Policy Languages

Michael Carl Tschantz and Shriram Krishnamurthi
Brown University

 
Data-Centric Security: Role Analysis and Role Typestates

Vugranam C. Sreedhar
IBM T.J. Watson Research Center

 
Lunch 12:50 – 2:20

Industry Presentations/Panel

- Identity Management and Compliance
Axel Kern, Beta Systems Software AG, Germany

- The Policy Machine: An Emerging Access Control Standard
David Ferraiolo, National Institute of Standards and Technology

- The OneHealthPort Trusted Community: Simplifying Access to Information for Healthcare
Ravi Sandhu, TriCipher and George Mason University

2:20 – 3:50
Coffee Break 3:50 – 4:10

Industry Presentations/Panel

"Industry and Academic Panel on Future Directions in Access Control"


4:10 – 5:40
Dinner/Social Event  
June 9, 2006
Steering Committee Meeting 7:30 – 8:30
Registration 8:00 – 8:30

Session 6: Secure Collaboration

Chair - Bhavani Thuraisingham

8:30 – 10:00
A Usage-based Authorization Framework for Collaborative Computing Systems

Xinwen Zhang, Masayuki Nakae, Michael J. Covington, Ravi Sandhu
George Mason University, NEC Corporation, Intel Corporation

 
Inter-Instance Authorization Constraints for Secure Workflow Management

Janice Warner and Vijayalakshmi Atluri
Rutgers University

 
Role-based Access Management for Ad-hoc Collaboration

Jing Jin and Gail-Joon Ahn
University of North Carolina at Charlotte

 
Coffee Break 10:00 – 10:20

Session 7: Information Sharing

Chair - Csilla Farkas

10:20 – 12:20
Redirection Policies for Mission-Based Information Sharing

David Keppler, Vipin Swarup, Sushil Jajodia
The MITRE Corporation

 
XACML Policy Integration Algorithms

P. Mazzoleni, E. Bertino, B. Crispo, S. Sivasubramanian
University of Milan, Purdue University, Vrije Universiteit, University of Trento

 
Supporting Authorization Query and Inter-domain Role Mapping in Presence of Hybrid Role Hierarchy

Siqing Du and James B.D. Joshi
University of Pittsburgh

 
Semantic Access Control for Information Interoperation

Chi-Chun Pan, Prasenjit Mitra, Peng Liu
The Pennsylvania State University

 
Closing Remarks 12:20 – 12:30

PDF version Programs are available :

 

 

 


Copyright (c) 2005 ACM SACMAT All rights reserved.