About
Advance Program
Invited Speakers
Call for Papers
Important Dates
Accepted Papers
Program Committee
Officers
Conference Location
Registration
Hotel Reservation
Since 1995

 

Maintained and
Sponsored by

-- ACM OpenTOC to download SACMAT'15 papers --

June 1, 2015

08:45 - 09:00 Opening remarks
09:00 - 10:00

Keynote I (Chair: Florian Kerschbaum, SAP, Germany)

- Bart Preneel: Post-Snowden Threat Models

10:00 - 10:30 Coffee Break
10:30 - 12:00 Session 1: Formalism and Analysis (Session Chair: Jianwei Niu, University of Texas at San Antonio)
Valued Workflow Satisfiability Problem

- Jason Crampton (Royal Holloway, University of London); Gregory Gutin (Royal Holloway, University of London); Daniel Karapetyan (University of Nottingham)

Mohawk+T: Efficient Analysis of Administrative Temporal Role-Based Access Control (ATRBAC) Policies

- Jonathan Shahen (University of Waterloo); Jianwei Niu (University of Texas at San Antonio); Mahesh Tripunitara (University of Waterloo)

Automated Inference of Access Control Policies for Web Applications

- Ha Thanh Le (University of Luxembourg); Cu Duy Nguyen (University of Luxembourg); Lionel Briand (University of Luxembourg); Benjamin Hourte (HITEC Luxembourg S.A.)

12:00 - 13:30 Lunch
13:30 - 15:00 Session 2: Cloud (Session Chair: Federica M. Paci, University of Southampton)
Commune: Shared Ownership in an Agnostic Cloud

- Claudio Soriente (ETH Zurich); Ghassan Karame (NEC Laboratories Europe); Hubert Ritzdorf (ETH Zurich); Srdjan Marinovic (ETH Zurich); Srdjan Capkun (ETH Zurich)

SecLoc: Securing Location-Sensitive Storage in the Cloud

- Jingwei Li (The Chinese University of Hong Kong); Anna Squicciarini (The Pennsylvania State University); Dan Lin (Missouri University of Science and Technology); Shuang Liang (Nankai University); Chunfu Jia (Nankai University)

Mitigating Multi-Tenancy Risks in IaaS Cloud Through Constraints-Driven Virtual Resource Scheduling

- Khalid Bijon (University of Texas at San Antonio); Ram Krishnan (University of Texas at San Antonio); Ravi Sandhu (University of Texas at San Antonio)

15:00 - 15:30 Coffee Break
15:30 - 1700 Session 3: Logic and Inference (Session Chair: Philip W. L. Fong, University of Calgary)
A Logical Approach to Restricting Access in Online Social Networks

- Marcos Cramer (University of Luxembourg); Jun Pang (University of Luxembourg); Yang Zhang (University of Luxembourg)

Preventing Information Inference in Access Control

- Federica Paci (University of Trento); Nicola Zannone (Eindhoven University of Technology)

On Missing Attributes in Access Control: Non-deterministic and Probabilistic Attribute Retrieval

- Jason Crampton (Royal Holloway, University of London); Charles Morisset (Newcastle University); Nicola Zannone (Eindhoven University of Technology)

17:15 Sightseeing Ride with a Vintage Tram to "10er Marie", the oldest wine tavern in Vienna (1740) and location of the Mayor's Reception
18:30 Mayer's Reception at "10er Marie"

June 2, 2015

09:00 - 10:00 Keynote II (Chair: Adam J. Lee, University of Pittsburgh, USA)

- Trent Jaeger: Challenges in Making Access Control Sensitive to the "Right" Contexts

10:00 - 10:30 Coffee Break
10:30 - 12:00 Session 4: Access Management (Session Chair: Axel Kern, Beta Systems Software AG)
Relationship-Based Access Control for an Open-Source Medical Records System

- Syed Zain Rizvi (University of Calgary); Philip W. L. Fong (University of Calgary); Jason Crampton (Royal Holloway, University of London); James Sellwood (Royal Holloway, University of London)

Federated Access Management for Collaborative Network Environments: Framework and Case Study

- Carlos E. Rubio-Medrano (Arizona State University); Ziming Zhao (Arizona State University); Adam Doupe (Arizona State University); Gail-Joon Ahn (Arizona State University)

Fine-Grained Business Data Confidentiality Control in Cross-Organizational Tracking

- Weili Han (Fudan University); Yin Zhang (Fudan University); Zeqing Guo (Fudan University); Elisa Bertino (Purdue University)

12:00 - 13:30 Lunch
13:30 - 15:30 Session 5: Demonstrations (Session Chair: Andreas Schaad, HUAWEI European Research Center, Germany)
A Prototype to Reduce the Amount of Accessible Information

- Rainer Fischer (Hewlett Packard)

Relationship-Based Access Control for an Open-Source Medical Records System

- Syed Zain Rizvi (University of Calgary); Philip W. L. Fong (University of Calgary); Jason Crampton (Royal Holloway, University of London); James Sellwood (Royal Holloway, University of London)

A SMT-based Tool for the Analysis and Enforcement of NATO Content-based Protection and Release Policies

- Alessandro Armando (DIBRIS - University of Genova); Silvio Ranise (FBK-Irst); Riccardo Traverso (FBK (Fondazione Bruno Kessler)); Konrad Wrona (NCI Agency)

Towards a General Framework for Optimal Role Mining: A Constraint Satisfaction Approach

- Hassan Takabi (University of North Texas); Masoud Narouei (University of North Texas)

Hard Instances for Verification Problems in Access Control

- Nima Mousavi (Google); Mahesh Tripunitara (The University of Waterloo)

Initial encryption of large searchable data sets using Hadoop

- Feng Wang (SAP SE); Mathias Kohler (SAP SE); Andreas Schaad (SAP SE)

Generating Secure Images for CAPTCHAs through Noise Addition

- David Lorenzi (Rutgers University); Pratik Chattopadhyay (IIT Kharagpur); Emre Uzun (Rutgers University); Jaideep Vaidya (Rutgers University); Shamik Sural (IIT Kharagpur); Vijayalakshmi Atluri (Rutgers University)

15:30 - 16:00 Coffee Break
16:00 - 17:00 Session 6: Trust and Applications (Session Chair: Anna Squicciarini, Pennsylvania State University)
A Logic of Trust for Reasoning About Delegation And Revocation

- Marcos Cramer (University of Luxembourg); Agustin Ambrossio (University of Luxembourg)

Towards Attribute-Based Authorisation for Bidirectional Programming

- Lionel Montrieux (NII); Zhenjiang Hu (NII)

17:15 Transport to Dinner Location
18:00 Conference Dinner on a private vineyard with a view over Vienna and its surroundings

June 3, 2015

09:00 - 10:00 Session 7: Panel Discussion (Session Chairs: Anna Squicciarini, Pennsylvania State University, and Ting Yu, QCRI)

- Privacy and Access Control, how are these two concepts related?

- Panelist: TBA

10:00 - 10:30 Coffee Break
10:30 - 12:00 Session 8: Permission Management (Session Chair: TBA)
Mitigating Access Control Vulnerabilities through Interactive Static Analysis

- Jun Zhu (University of North Carolina at Charlotte); Bill Chu (University of North Carolina at Charlotte); Heather Lipford (University of North Carolina at Charlotte); Tyler Thomas (University of North Carolina at Charlotte)

Towards a General Framework for Optimal Role Mining: A Constraint Satisfaction Approach

- Jafar Haadi Jafarian (University of North Carolina at Charlotte); Hassan Takabi (University of North Texas); Hakim Touati (University of North Carolina at Charlotte); Ehsan Hesamifard (University of North Texas); Mohamed Shehab (University of North Carolina at Charlotte)

SPA: Inviting Your Friends to Help Set Android Apps

- Zeqing Guo (Fudan University); Weili Han (Fudan University); Liangxing Liu (Fudan University); Wenyuan Xu (Zhejiang University); Ruiqi Bu (Fudan University); Minyue Ni (Fudan University)

12:00 - 13:30 Lunch
13:30 - 15:50 SACMAT 2015 PhD Consortium

Copyright (c) ACM SACMAT All rights reserved.