[dbitaly] Call for Participation: 23rd Annual IFIP WG 11.3 Working Conference on Data and Applications Security (DBSec09)

Claudio A. Ardagna claudio.ardagna a unimi.it
Mar 9 Giu 2009 09:26:21 CEST

                       CALL FOR PARTICIPATION

                            DBSec 2009

             23rd Annual IFIP WG 11.3 Working Conference
                 on Data and Applications Security

             URL: http://www.ciise.concordia.ca/dbsec09/

                         July 12-15, 2009

               Concordia University, Montreal, Canada

About the Conference
The DBSec'09 conference is the 23rd Annual Working Conference of IFIP WG
11.3 on Data and Application Security. The conference will be a full 3-day
event featuring technical presentations of 18 full papers and 5 short
papers, a keynote and a tutorial.

Michael Reiter, "Better Architectures and New Security Applications for
Coarse Network Monitoring."

Joachim Biskup, "How to protect Information: Inference Control for
Logic-Oriented Information Systems."

Accepted Papers

Full papers
Joachim Biskup, Jens Seiler and Torben Weibert. Controlled query
evaluation and inference-free view updates
Lars E. Olson, Carl A. Gunter, William R. Cook and Marianne Winslett.
Implementing Reflective Access Control in SQL
Keith Frikken. Practical Private DNA String Searching and Matching through
Efficient Oblivious Automata Evaluation
Roopa Vishwanathan and Steve Tate. Improving Cut-and-Choose Protocols
using Trusted Computing Technology, with Applications to Fair Exchange and
Verifiable Encryption
Simon Foley and William Fitzgerald. An Approach to Autonomic Security
Policy Configuration using Semantic Threat Graphs
Yermek Nugmanov, Brajendra Panda and Yi Hu. Analysis of Data Dependency
Based Intrusion Detection System
Christoph Sturm, Ela Hunt and Marc H. Scholl. Distributed Privilege
Enforcement in PACS
Valentina Ciriani, Sabrina De Capitani di Vimercati, Sara Foresti, Sushil
Jajodia, Stefano Paraboschi and Pierangela Samarati. Enforcing
confidentiality constraints on sensitive databases with lightweight
trusted clients
Xiaofeng Yang and Mohammad Zulkernine. Secure Method Calls by
Instrumenting Bytecode with Aspects
Fabien Autrel, Nora Cuppens-Boulahia and Frederic Cuppens. Formal
specification of a reaction policy
Pawel Jurczyk and Li Xiong. Distributed Anonymization: Achieving Privacy
for Both Data Subjects and Data Providers
Wenjuan Xu, Xinwen Zhang and Gail-Joon Ahn. Towards System Integrity
Protection with Graph-Based Policy Analysis
Mohamed Layouni, Kristof Verslype, Mehmet Tahir Sand\i kkaya, Bart De
Decker and Hans Vangheluwe. Privacy-preserving Telemonitoring for eHealth
Heechang Shin and Vijay Atluri. Spatiotemporal Access Control Enforcement
under Uncertain Location Estimates
Hakima Ould-Slimane, Mohamed Mejri and Kamel Adi. Using Edit Automata for
Rewriting-Based Security Enforcement
Wolter Pieters and Qiang Tang. Data is key: introducing the data-based
access control paradigm
Enrico Scalavino, Vaibhav Gowadia and Emil C. Lupu. PAES: Policy-Based
Authority Evaluation Scheme
Bechara Al Bouna and Richard Chbeir. Detecting Inference Channels in
Private Multimedia Data via Social Networks

Short Papers
Steven Demurjian, Solomon Berhe and Thomas Agresta. Emerging Trends in
Health Care Delivery: Towards Collaborative Security for NIST RBAC
Ehud Gudes, Nurit Gal-oz and Alon Grubshtein. Methods for computing trust
and reputation while preserving privacy
Olivier Sarrouy, Eric Totel and Bernard Jouga. Building an application
data behavior model for intrusion detection
Manachai Toahchoodee, Ramadan Abdunabi, Indrakshi Ray and Indrajit Ray. A
Trust-Based Access Control Model for Pervasive Computing Systems

General Chair
Mourad Debbabi, Concordia University, Canada

Program Co-Chairs
Ehud Gudes, Ben-Gurion University of the Negev, Israel
Jaideep Vaidya, Rutgers University, U.S.A.

Contact Person
Ms. Sheila Anderson (anderson a ciise.concordia.ca)
-------------- parte successiva --------------
Un allegato HTML  stato rimosso...
URL: http://list.dia.uniroma3.it/pipermail/dbitaly/attachments/20090609/da32da62/attachment.htm 

Maggiori informazioni sulla lista dbitaly