About
Advance Program
Call for Papers
Important Dates
Accepted Papers
Program Committee
Officers
Registration
Hotel Reservation
Miscellaneous
Since 1995

 

Maintained and
Sponsored by

SACMAT 09

Date
Event
Time
June 3, 2009 Registration/Coffee Break 08:00 – 08:45
Welcome 08:45 – 09:00

Session 1: Keynote Address
Title: Challenges and Opportunities for Virtualized Security in the Clouds

Frank Siebenlist, Argonne National Laboratory, USA

09:00– 10:00
Coffee Break 10:00 – 10:30

Session 2: Security Analysis and Verification

Session chair: Mahesh V. Tripunitara (University of Waterloo, Canada)

10:30 – 12:30
Safety in Discretionary Access Control for Logic-based Publish-subscribe Systems

Kazuhiro Minami, Nikita Borisov, Carl Gunter
University of Illinois at Urbana Champaign, USA

 
Ensuring Spatio-Temporal Access Control for Real-World Applications

Manachai Toahchoodee, Indrakshi Ray, Kyriakos Anastasakis, Geri Georg, Behzad Bordbar
Colorado State University, USA

 
An Efficient Framework for User Authorization Query in RBAC Systems

Guneshi Wickramaarachchi, Wahbeh Qardaji , Ninghui Li
Purdue University, USA

 
Towards Formal Security Analysis of GTRBAC using Timed Automata

Samrat Mondal, Shamik Sural, Indian Institute of Technology - Kharagpur, India
Vijayalakshmi Atluri, Rutgers University, USA

 
Lunch 12:30 – 02:00

Session 3: Multidomain Policy Integration

Session chair: Adam J. Lee (University of Pittsburgh, USA) 

02:00 – 03:30
xDomain: Cross-border Proofs of Access

Lujo Bauer, Carnegie Mellon University, USA
Limin Jia, University of Pennsylvania, USA
Mike Reiter, University of North Carolina at Chapel Hill, USA
David Swasey, Carnegie Mellon University, USA

 

Dynamic Mandatory Access Control for Multiple Stakeholders

Vikhyath Rao, Trent Jaeger, Pennsylvania State University, USA

 
An Algebra for Fine-Grained Integration of XACML Policies

Prathima Rao, Purdue University, USA
Dan Lin, Missouri University of Science and Technology, USA
Elisa Bertino, Ninghui Li, Purdue University, USA
Jorge Lobo, IBM T. J. Watson Research Center, USA

 
Coffee Break 03:30 – 04:00

Session 4: Panel I
Usability Meets Access Control:Challenges and Research Opportunities (pdf)

Panel Moderator:
Konstantin Beznosov, University of British Columbia, Canada

Panelists:
Philip Inglesant, University College London, UK
Jorge Lobo, IBM T. J. Watson Research Center, USA
Rob Reeder, Microsoft Research, USA
Mary Ellen Zurko, IBM LotusLive Security Architecture and Strategy, USA

04:00 – 05:30
June 4, 2009

Session 5: Role Engineering

Session chair: Vijay Atluri (Rutgers University, USA)

08:30 – 10:00
Automating Role-based Provisioning by Learning from Examples

Qun Ni, Purdue University, USA
Jorge Lobo, Seraphin Calo, Pankaj Rohatgi, IBM T. J. Watson Research Center, USA
Elisa Bertino, Purdue University, USA

 
A Formal Framework to Elicit Roles with Business Meaning in RBAC Systems

Alessandro Colantonio, Alberto Ocello, Engiweb Security, Italy
Roberto Di Pietro, Nino Vincenzo Verde, Universita di Roma Tre, Italy

 
Evaluating Role Mining Algorithms

Ian Molloy, Ninghui Li, Tiancheng Li, Ziqing Mao Qihua Wang
Purdue University, USA

 
Coffee Break 10:00 – 10:30

Session 6: Secure Sharing and Policy Combination

Session chair: Elena Ferrari (University of Insubria, Italy)

10:30 – 12:30
A Decision Support System for Secure Information Sharing

Achille Fokoue, Mudhakar Srivatsa, Pankaj Rohatgi, IBM T.J. Watson Research Center, USA
Peter Wrobel, CESG, UK
John Yesberg, DSTL, UK

 
Formal Models for Group-Centric Secure Information Sharing

Ram Krishnan, George Mason University, USA
Ravi Sandhu, Jianwei Niu,William Winsborough, University of Texas at San Antonio, USA

 
Patient-centric Authorization Framework for Sharing Electronic Health Records

Jing Jin, University of North Carolina at Charlotte, USA
Gail-Joon Ahn, Hongxin Hu, Arizona State University, USA
Michael Covington, Intel Corporation, USA
Xinwen Zhang, Samsung Information Systems, USA

 
Access Control Policy Combination: Theory Meets Practice

Ninghui Li, Qihua Wang, Wahbeh Qardaji, Elisa Bertino, Prathima Rao,
Purdue University, USA
Jorge Lobo, IBM T. J. Watson Research Center, USA
Dan Lin, Missouri University of Science and Technology, USA

 
Lunch 12:30 – 02:00

Session 7: XACML and RBAC

Session chair: Lujo Bauer (Carnegie Mellon University, USA)

02:00 – 03:30

Supporting RBAC with XACML + OWL

Rodolfo Ferrini, Elisa Bertino, Purdue University, USA

 

Efficient Access Enforcement in Distributed Role-Based Access Control (RBAC) Deployments

Mahesh Tripunitara, University of Waterloo, Cananda
Bogdan Carbunar, Motorola Inc., USA

 

Symbolic Policy Analysis for Parameterized Administrative Role Based Access Control

Scott Stoller, Stony Brook University, USA
Ping Yang, Mikhail I. Gofman, Binghampton University, USA
C. R. Ramakrishnan, Stony Brook University, USA

 

Coffee Break

03:30 – 04:00

Session 8: Panel II
Spatio-Temporal Access Control: Challenges and Applications(pdf)

Panel Moderator:
Maria Luisa Damiani, University of Milan, Italy

Panelists:
Herve Martin, University of Grenoble, France
Yucel Saygin, Sabanci University, Turkey
Maria Rita Spada, Wind Telecomunicazioni, Italy
Cedric Ulmer, SAP Labs, Sophia Antipolis, France

04:00 – 05:30

Conference Banquet

07:00-10:00
June 5, 2009

Session 9: Model/Meta-model and Extensions

Session chair: Jason Crampton (Royal Holloway, University of London, UK)

08:30 – 10:00
A Semantic Web Based Framework for Social Network

Barbara Carminati, Elena Ferrari, University of Insubria, Italy
Raymond Heatherly, Murat Kantarcioglu, Bhavani Thuraisingham, University of Texas at Dallas, USA

 
The Next 700 Access Control Models or a Unifying Meta-Model?

Steve Barker, King's College London, UK

 
Extending Access Control Models with Break-glass

Achim D. Brucker, Helmut Petritsch, SAP Research

 

Coffee Break

10:00 – 10:30

Session 10: Trust and Access Control in Systems

Session Chair: Indrakshi Ray (Colorado State University, USA)

10:30 – 12:30
Working Set-Based Access Control for Network File Systems

Stephen Smaldone, Vinod Ganapathy, Liviu Iftode
Rutgers University, USA

 

Towards a Dynamic and Composite Model of Trust

Adam J. Lee, University of Pittsburgh, USA
Ting Yu, North Carolina State University, USA

 
Analysis of Virtual Machine System Policies

Sandra Rueda, Hayawardh Vijayakumar, Trent Jaeger, The Pennsylvania State University, USA

 

Trojan Horse Resistant Discretionay Access Control

Ziqing Mao, Ninghui Li, Hong Chenm, Purdue University, USA
Xuxian Jiang, North Carolina State University, USA

 
Wrap up and Adjourn 12:30 –

 

 


Copyright (c) ACM SACMAT All rights reserved.