About
Advance Program
Call for Papers
Important Dates
Program Committee
Officers
Registration
Hotel Reservation
Miscellaneous
Since 1995

 

Maintained and
Sponsored by

SACMAT 08

Date
Event
Time
Coffee Break 08:00 – 08:30
June 11, 2008 Welcome 8:45– 9:00

Session 1: Keynote Address

Managing identities and entitlements - trends, challenges, and architectural approach

 Dr. Nataraj (Raj) Nagaratnam, IBM Distinguished Engineer
Chief Architect, Identity and SOA Security

9:00– 10:00
Coffee Break 10:00 – 10:30

Session 2: Role Mining

Session chair: Axel Kern

10:30 – 12:00
Fast Exact and Heuristic Methods for Role Minimization Problems

Alina Ene (Princeton University)
William Horne (HP Labs)
Nikola Milosavljevic (Stanford University)
Prasad Rao (HP Labs), Robert Schreiber (HP Labs)
Robert E. Tarjan (HP Labs / Princeton University)

 
Migrating to Optimal RBAC with Minimal Perturbation

Jaideep Vaidya, Vijay Atluri, Qi Guo, Nabil Adam (Rutgers University)

 
Mining Roles with Semantic Meanings

Ian Molloy, Hong Chen, Tiancheng Li, Qihua Wang, Ninghui Li, Elisa Bertino (Purdue University)
Seraphin Calo and Jorge Lobo (IBM T.J. Watson Research Center)

 
Lunch 12:00 – 1:30

Session 3: Workflow Systems

Session chair: David Eyers
 

1:30 – 3:00
Delegation and Satisfiability in Workflow Systems

Jason Crampton and Hemanth Khambhammettu (Royal Holloway, University of London)

 

Enforcing Security Properties in Task-based Systems

Keith Irwin (North Carolina State University)
William Winsborough (University of Texas at San Antonio)
Ting Yu (North Carolina State University)

 
Task-Based Entailment Constraints For Basic Workflow Patterns

Christian Wolter (SAP Research)
Andreas Schaad (SAP AG)

Christoph Meinel (Hasso-Plattner-Institut)

 
Coffee Break 3:00 – 3:30

Session 4: Panel on Role Engineering

Session chair: Vijay Atluri

3:30 – 5:00

Conferencee Banquet


7:00 – 10:00
June 12, 2008

Session 5: Role Based Access Control

Session chair: Elisa Bertino

8:30 – 10:00
Authorization Recycling in RBAC Systems

Qiang Wei (University of British Columbia)
Jason Crampton (Royal Holloway, University of London)
Konstantin Beznosov, Matei Ripeanu (University of British Columbia)

 
ROWLBAC - Representing Role Based Access Control in OWL

Tim Finin, Anupam Joshi (University of Maryland Baltimore County)
Lalana Kagal (Massachusetts Institute of Technology)
Jianwei Niu, Ravi Sandhu (
University of Texas at San Antonio)
Bhavani Thuraisingham (
University of Texas at Dallas)
William Winsborough (
University of Texas at San Antonio)

 
A Framework for User Authorization Query Processing in RBAC extended with Hybrid Hierarchy and Constraints

Yue Zhang and James Joshi (University of Pittsburgh)

 
Coffee Break 10:00 – 10:30

Session 6: Access Control in Distributed Environments

Session chair: Dongwan Shin

10:30 – 12:00
RBAC Administration in Distributed Systems

Marnix Dekker (University of Twente)
Jason Crampton (
Royal Holloway, University of London)
Sandro Etalle (
University of Twente)

 
Policy Decomposition for Collaborative Access Control

Dan Lin, Prathima Rao, Elisa Bertino, Ninghui Li (Purdue University)
Jorge Lobo (IBM T.J. Watson Research Center) 

 
Context-Aware Role-based Access Control in Pervasive Computing Systems

Devdatta Kulkarni and Anand Tripathi (University of Minnesota)

 
Lunch 12:00 – 1:30

Session 7: Obligations

Session chair: Gail-Joon Ahn

1:30 – 3:00

Beyond UCON Core Models with General Obligation Model and Continuity-Enhanced Policy Enforcement Engine

Basel Katt (Innsbruck University)
Xinwen Zhang (
Samsung Information Systems America)
Ruth Breu, Michael Hafner (
Innsbruck University
Jean-Pierre Seifert (
Samsung Information Systems America)

 

An Obligation Model Bridging Access Control Policies and Privacy Policies

Qun Ni, Elisa Bertino (Purdue University)
Jorge Lobo (IBM T.J. Watson Research Center)

 

Access Control by Action Control

Steve Barker (King's College, London University)

 

Coffee Break

3:00 – 3:30

Session 8: Panel on Meta Models for Access Control

Session Chair: James Joshi

3:30 – 5:00
June 13, 2008
Administrative Remarks 8:45– 9:00

Session 9: Access Control in Systems

Session chair: Lujo Bauer

9:00 – 10:30
Measuring Integrity on Mobile Phone Systems

Divya Muthukumaran, Anuj Sawani, Joshua Schiffman (The Pennsylvania State University)
Brian M. Jung (
Samsung Electronics Co., Ltd.)
Trent Jaeger (
The Pennsylvania State University)

 
Visualization Based Policy Analysis: Case Study in SELinux

Wenjuan Xu, Mohamed Shehab and Gail-Joon Ahn (University of North Carolina at Charlotte)

 
Model based behavioral Attestation

Masoom Alam (Institute of Management Sciences, Pakistan)
Xinwen Zhang (
Samsung Information Systems America)
Mohammad Nauman, Tamleek Tanveer (I
nstitute of Management Sciences, Pakistan)
Jean-Pierre Seifert (
Samsung Information Systems America)

 

Coffee Break

10:30 – 11:00

Session 10: Policy Analysis

Session Chair: Jason Crampton

11:00 – 12:00
Detecting and Resolving Policy Misconfigurations in Access-Control Systems

Scott Garriss, Lujo Bauer (Carnegie Mellon University)
Michael K. Reiter (
University of North Carolina at Chapel Hill)

 

Enabling verification and conformance testing for access control model

Hongxin Hu and Gail-Joon Ahn (University of North Carolina at Charlotte)

 
Lunch 12:00 – 1:30

 

 


Copyright (c) 2005-2008 ACM SACMAT All rights reserved.