About
Advance Program
Invited Speakers
Call for Papers
Important Dates
Accepted Papers
Program Committee
Officers
Conference Location
Registration
Hotel Reservation
Since 1995

 

Maintained and
Sponsored by

SACMAT 2014

All sessions are in Physics and Astronomy 148, except breakfast & lunch

Date
Event
Time
June 25, 2014 Registration 08:00 –
Continental Breakfast (Atrium, Physics and Astronomy Building) 08:00 – 09:00
Opening Remarks 08:45 – 09:00

Keynote Session (Session Chair: Ian M. Molloy, IBM-Watson)
Title: A Bodyguard of Lies: The Use of Honey Objects in Information Security

Dr. Ari Juels - Cornell Tech, NYC, USA

09:00 – 10:00
Coffee Break 10:00 – 10:30

Session 1

Session chair: Florian Kerschbaum, SAP

10:30 – 12:00
Hardware-Enhanced Distributed Access Enforcement for Role-Based Access Control

Gedare Bloom and Rahul Simha (Computer Science Department, The George Washington University)

 
An Access Control Concept for Novel Automotive HMI Systems

Simon Gansel (Daimler AG), Stephan Schnitzer (University of Stuttgart), Ahmad Gilbeau-Hammoud, Viktor Friesen (Daimler AG), Frank Dürr, Kurt Rothermel (University of Stuttgart) and Christian Maihöfer (Daimler AG)

 
Monitor Placement for Large-Scale Systems

Nirupama Talele, Jason Teutsch (Penn State University), Robert Erbacher (Utah State University) and Trent Jaeger (Penn State University)

 
Lunch (Atrium, Physics and Astronomy Building) 12:00 – 13:30

Session 2

Session chair: Philip Fong, University of Calgary 

13:30 – 15:00
Anomaly Detection and Visualization in Generative RBAC Models

Maria Leitner and Stefanie Rinderle-Ma (University of Vienna)

 

Reduction of Access Control Decisions

Charles Morisset (Newcastle University) and Nicola Zannone (Eindhoven University of Technology)

 
Sorting Out Role Based Access Control

Wouter Kuijper and Victor Ermolaev (Nedap N.V., Netherlands)

 
Coffee Break 15:00 – 15:30

Session 3

Session chair: Adam Lee, University of Pittsburgh 

15:30 – 17:00
Towards More Usable Information Flow Policies for Contemporary Operating Systems

Wai Kit Sze, Bhuvan Mital and R. Sekar (Stony Brook University)

 

Attribute Based Access Control for APIs in Spring Security (Demo)

Alessandro Armando (DIBRIS - University of Genova), Roberto Carbone, Eyasu Getahun Chekole (Security & Trust Unit, FBK) and Silvio Ranise (FBK-Irst)

 
Comprehensive Integrity Protection for Desktop Linux (Demo)

Wai Kit Sze and R. Sekar (Stony Brook University)

 
June 26, 2014
Registration 08:00 –
Continental Breakfast (Atrium, Physics and Astronomy Building) 08:00 – 09:00

Session 4

Session chair: Nicola Zannone, Eindhoven University of Technology

9:00 – 10:30
Game Theoretic Analysis of Multiparty Access Control in Online Social Networks

Hongxin Hu (Delaware State University), Gail-Joon Ahn, Ziming Zhao (Arizona State University) and Dejun Yang (Colorado School of Mines)

 
Scalable and Precise Automated Analysis of Administrative Temporal Role-Based Access Control

Silvio Ranise (Security & Trust, FBK-Irst, Trento, Italia), Anh Truong (University of Trento and Security & Trust, FBK-Irst, Trento, Italia) and Alessandro Armando (Security &Trust, FBK-Irst, Trento, Italia and DIBRIS, University of Genova, Italia)

 
Access Control Models for Geo-Social Computing Systems

Ebrahim Tarameshloo and Philip W. L. Fong (University of Calgary)

 
Coffee Break 10:30 – 11:00

Panel Session (Session Chair: Lujo Bauer, Carnegie Mellon University, and Florian Kerschbaum, SAP AG)
Title: What are the Most Important Challenges for Access Control in New Computing Domains, such as Mobile, Cloud and Cyber-physical Systems?

Panelists:

  • Tamara Denning (University of Washington)
  • Trent Jaeger (Pennsylvania State University)
  • Adam Lee (University of Pittsburgh)
  • Ravi Sandhu (University of Texas San Antonio)
11:00 – 12:00
Lunch (Atrium, Physics and Astronomy Building) 12:00 – 13:30

Session 5

Session chair: Jianwei Niu, University of Texas at San Antonio

13:30 – 15:00

Limiting Access to Unintentionally Leaked Sensitive Documents Using Malware Signatures

Mordechai Guri, Gabi Kedma, Buky Carmeli and Yuval Elovici (Ben-Gurion University)

 

Optimized and Controlled Provisioning of Encrypted Outsourced Data

Anis Bkakria (Telecom Bretagne Rennes), Andreas Schaad, Florian Kerschbaum (SAP AG), Frederic Cuppens, Nora Cuppens-Boulahia (Telecom Bretagne Rennes) and David Gross-Amblard (Universite de Rennes 1 - IRISA)

 

User-Centric Identity as a Service-Architecture for eIDs with Selective Attribute Disclosure

Daniel Slamanig (Graz University of Technology - IAIK), Klaus Stranacher and Bernd Zwattendorfer (EGIZ)

 
Coffee Break 15:00 – 15:30

Session 6

Session chair: Axel Kern, Beta Systems Software AG 

15:30 – 17:00
Towards Fine Grained RDF Access Control

Jyothsna Rachapalli, Vaibhav Khadilkar, Murat Kantarcioglu and Bhavani Thuraisingham (The University Of Texas Dallas)

 

Redaction based RDF Access Control Language (Demo)

Jyothsna Rachapalli, Vaibhav Khadilkar, Murat Kantarcioglu and Bhavani Thuraisingham (The University Of Texas Dallas)

 
A System for Risk Awareness During Role Mining (Demo)

Sharmin Ahmed and Sylvia Osborn (University of Western Ontario)

 
Banquet (Bus pickup at 5:15 from conference location) 17:15 –
June 27, 2014
Registration 08:00 –
Continental Breakfast (Atrium, Physics and Astronomy Building) 08:00 – 09:00

Keynote Session (Session Chair: Mahesh Tripunitara, University of Waterloo)
Title: Re-thinking Networked Privacy, Security, Identity and Access control in Our Surveillance States

Dr. Andrew Clement - University of Toronto, Canada

09:00 – 10:00
Coffee Break 10:00 – 10:30

Session 7

Session chair: Silvio Ranise, FBK-irst

10:30 – 12:00

Path Conditions and Principal Matching: A New Approach to Access Control

Jason Crampton and James Sellwood (Royal Holloway, University of London)

 

An Actor-Based, Application-Aware Access Control Evaluation Framework

William C. Garrison III, Adam J. Lee (University of Pittsburgh) and Timothy Hinrichs (VMware, Inc.)

 

Policy Models to Protect Resource Retrieval

Hayawardh Vijayakumar, Xinyang Ge and Trent Jaeger (Penn State University)

 
Closing Remarks 12:00 – 12:05

 

 


Copyright (c) ACM SACMAT All rights reserved.