[PET] [DBSec 2010] Call for Participation

Claudio Agostino Ardagna (claudio.ardagna) claudio.ardagna at unimi.it
Fri Jun 11 09:55:18 BST 2010


[Apologies if you receive multiple copies of this message]

CALL FOR PARTICIPATION 

**********************************************************************
24th Annual IFIP WG 11.3 Working Conference
on Data and Applications Security and Privacy (DBSec 2010)
Rome, Italy -- June 21-23, 2010
http://dbsec2010.dti.unimi.it
**********************************************************************


ABOUT THE CONFERENCE

DBSec is an annual international conference covering research in data and
applications security and privacy.  The conference seeks submissions from
academia, industry, and government presenting novel research on all theoretical
and practical aspects of data protection, privacy, and applications security.
The conference will be a 3-day event featuring technical
presentations of 18 full papers and 11 short papers. It also includes
a keynote speech and a panel.

The 24th Annual IFIP WG 11.3 Working Conference on Data and Applications
Security and Privacy (DBSec 2010) will be held in Rome,
Italy.


REGISTRATION

Registration information is available at
https://dbsec2010.dti.unimi.it/registration


PROGRAM

Monday, June 21, 2010
---------------------

 8:30 -  9:10 Registration

 9:15 -  9.30 Opening Remarks

 9:30 - 10:30 Keynote speaker: Prof. Francesco Pizzetti,
              President of the Italian Data Protection Authority

10:30 - 11:00 Coffee break

11:00 - 12:30 QUERY AND DATA PRIVACY

- Generalizing PIR for Practical Private Retrieval of Public Data
  (Shiyuan Wang, Divyakant Agrawal, and Amr El Abbadi)

- A Logic of Privacy
  (Steve Barker and Valerio Genovese)

- Understanding Privacy Risk of Publishing Decision Trees
  (Zutao Zhu and Wenliang Du)

12:30 - 14:00 Lunch

14:00 - 15:30 DATA PROTECTION

- Secure Outsourcing of DNA Searching via Finite Automata
  (Marina Blanton and Mehrdad Aliasgari)

- A Labelling System for Derived Data Control
  (Enrico Scalavino, Vaibhav Gowadia, and Emil C. Lupu)

- On the Identification of Property Based Generalizations in Microdata
  Anonymizations
  (Rinku Dewri, Indrajit Ray, Indrakshi Ray, and Darrell Whitley)

15:30 - 16:00 Coffee break

16:00 - 17:15 ACCESS CONTROL - 1

- An Access Control Model for Web Databases
  (Ahlem Bouchahda-Ben Tekaya, Nhan Le Thanh, Adel Bouhoula,
   and Faten Labbene-Ayachi)

- Modelling Dynamic Access Control Policies for Web-based
  Collaborative Systems
  (Hasan Qunoo and Mark Ryan)

- Evaluating the Risk of Adopting RBAC Roles
  (Alessandro Colantonio, Roberto Di Pietro, Alberto Ocello,
   and Nino Vincenzo Verde)

- Preserving Integrity and Confidentiality of a Directed Acyclic
  Graph Model of Provenance
  (Amril Syalim, Takashi Nishide, and Kouichi Sakurai)

- When ABE Meets RSS
  (Yu Chen, Hyun Sung Kim, Jianbin Hu, and Zhong Chen)

17:15 - 17:45 Business meeting

18:30 Reception

______________________________________________________________________

Tuesday, June 22, 2010
----------------------

 9:00 - 10:30 ACCESS CONTROL - 2

- Role Mining in the Presence of Noise
  (Jaideep Vaidya, Vijayalakshmi Atluri, Qi Guo, and Haibing Lu)

- Distributed and Secure Access Control in P2P Databases
  (Angela Bonifati, Ruilin Liu, and Hui (Wendy) Wang)

- Constructing Key Assignment Schemes from Chain Partitions
  (Jason Crampton, Rosli Daud, and Keith M. Martin)

10:30 - 11:00 Coffee break

11:00 - 12:30 DATA CONFIDENTIALITY AND QUERY VERIFICATION

- fQuery: SPARQL Query Rewriting to Enforce Data Confidentiality
  (Said Oulmakhzoune, Nora Cuppens-Boulahia, Frederic Cuppens,
   and Stephane Morucci)

- Efficient Inference Control for Open Relational Queries
  (Joachim Biskup, Sven Hartmann, Sebastian Link,
   and Jan-Hendrik Lochner)

- Query Racing: Fast Completeness Certification of Query Results
  (Bernardo Palazzi, Maurizio Pizzonia, and Stefano Pucacco)

12:30 - 14:00 Lunch

14:00 - 15:00 Panel:
              Assured Information Sharing: Techniques and Challenges

15:20 Social event: Tour of Imperial Rome
      (Arch of Constantine, Colosseum, the Roman Forum,
       Capitol Square, Piazza Venezia)

20:00 Social dinner

______________________________________________________________________

Wednesday, June 23, 2010
------------------------


 9:00 - 10:30 POLICY DEFINITION AND ENFORCEMENT

- Mining Likely Properties of Access Control Policies via
  Association Rule Mining
  (JeeHyun Hwang, Tao Xie, Vincent Hu, and Mine Altunay)

- Scalable and Efficient Reasoning for Enforcing Role-Based
  Access Control
  (Tyrone Cadenhead, Murat Kantarcioglu,
   and Bhavani Thuraisingham)

- Enforcing Request Integrity in Web Applications
  (Karthick Jayaraman, Grzegorz Lewandowski, Paul G. Talaga,
   and Steve J. Chapin)

10:30 - 11:00 Coffee break

11:00 - 12:30 TRUST AND IDENTITY MANAGEMENT

- Using Trust-Based Information Aggregation for Predicting Security
  Level of Systems
  (Siv Hilde Houmb, Sudip Chakraborty, Indrakshi Ray,
   and Indrajit Ray)

- Modelling Dynamic Trust with Property Based Attestation in Trusted
  Platforms
  (Aarthi Nagarajan, Vijay Varadharajan, Michael Hitchens,
   and Saurabh Arora)

- Towards Privacy-enhancing Identity Management in Mashup-providing
  Platforms
  (Jan Zibuschka, Matthias Herbert, and Heiko Rossnagel)

12:30 - 14:00 Lunch

14:00 - 15:30 IDENTITY MANAGEMENT, SPAM DETECTION, AND AUTHENTICATION

- PriMan: A Privacy-Preserving Identity Framework
  (Kristof Verslype, Pieter Verhaeghe, Jorn Lapon, Vincent Naessens,
   and Bart De Decker)

- Detecting Spam Bots in Online Social Networking Sites:
  A Machine Learning Approach
  (Alex Hai Wang)

- Authentication Assurance Level Taxonomies for Smart Identity Token
  Deployments - A New Approach
  (Ramaswamy Chandramouli)

- Performance Evaluation of Non-Parallelizable Client Puzzles for
  Defeating DoS Attacks in Authentication Protocols
  (Suratose Tritilanunt)

- Secure Location Verification
  (Georg T. Becker, Sherman C. Lo, David S. De Lorenzo,
   Per K. Enge, and Christof Paar)

- A Secure RFID Ticket System For Public Transport
  (Kun Peng and Feng Bao)

15:30 Farewell


MORE INFORMATION

Additional information about the conference can be found at
http://dbsec2010.dti.unimi.it


More information about the PET mailing list