[dbitaly] DBSec 2017 - Call for Participation (Early Bird Registration ends June 09, 2017)

Fengjun Li fli a ittc.ku.edu
Gio 8 Giu 2017 01:10:37 CEST


PRELIMINARY CALL FOR PARTICIPATION


*** Early Bird registration ends June 09, 2017 ***


********************************************************
31st Annual IFIP WG 11.3 Conference on Data and 
Applications Security and Privacy (DBSec 2017)
Philadelphia, PA, USA -- July 19-21, 2017
https://dbsec2017.ittc.ku.edu
********************************************************


ABOUT THE CONFERENCE
====================
DBSec is an annual international conference covering research in data and
applications security and privacy. The 31st Annual IFIP WG 11.3
Conference on Data and Applications Security and Privacy (DBSec 2017) will
be held in Philadelphia, PA, USA. The conference seeks submissions from
academia, industry, and government presenting novel research on all
theoretical and practical aspects of data protection, privacy, and
applications security. The conference will be a 3-day event featuring
technical presentations of  21 full papers and 9 short papers, and one
keynote speech.


REGISTRATION
============
Registration information is available at
https://dbsec2017.ittc.ku.edu/?pageid=registrations

Early Bird registration ends June 09, 2017


PROGRAM (Reception and Social Event to be announced)
====================================================

Wednesday, July 19th, 2017
-----------------------

08:30 - 09:15 Registration

09:15 - 09:30 Conference Opening and Welcome

09:30 - 10:30 KEYNOTE SPEECH
- Attribute-Based Access Control: Insights and Challenges
  (Ravi Sandhu, University of Texas at San Antonio, USA)

10:30 - 11:00 Coffe break

11:00 - 12:30 PRIVACY 1
- Gaussian Mixture Models for Classification and Hypothesis Tests under 
  Differential Privacy
  (Xiaosu Tong, Bowei Xi, Murat Kantarcioglu and Ali Inan) - Differentially
Private k-Skyband Query Answering through Adaptive 
  Spatial Decomposition
  (Ling Chen, Ting Yu and Rada Chirkova) - Mutually private location
proximity detection with access control
  (Michael Solomon, Vaidy Sunderam, Li Xiong and Ming Li)

12:30 - 14:00 Lunch 

14:00 - 15:20 SECURE SYSTEMS
- Keylogger Detection Using a Decoy Keyboard
  (Seth Simms, Margot Maxwell, Sara Johnson and Julian Rrushi) - The fallout
of key compromise in a proxy-mediated key agreement protocol
  (David Nunez, Isaac Agudo and Javier Lopez) - Improving resilience of
behaviometric based continuous authentication 
  with multiple accelerometers
  (Tim Van Hamme, Davy Preuveneers and Wouter Joosen)

15:20 - 15:50 Coffe break

15:50 - 17:30 PRIVACY 2
- Privacy-preserving elastic net for data encrypted by different keys - with

  an application on biomarker discovery
  (Jun Zhang, Meiqi He and Siu Ming Yiu) - Privacy-Preserving
Community-Aware Trending Topic Detection in Online 
  Social Media
  (Theodore Georgiou, Amr El Abbadi and Xifeng Yan) - Privacy-Preserving
Outlier Detection for Data Streams
  (Jonas Boehler, Daniel Bernau and Florian Kerschbaum) - Undoing of privacy
through innocuous actions
  (Vishwas Patil and R K Shyamasundar	)

17:30 - 18:00 Business Meeting


Thursday, July 20th, 2017
------------------------

09:00 - 10:30 ACCESS CONTROL 1
- Cryptographically Enforced Role-Based Access Control for NoSQL Distributed
  Databases
  (Yossif Shalabi and Ehud Gudes) - Resilient Reference Monitor for
Distributed Access Control via Moving 
  Target Defense
  (Dieudonne Mulamba and Indrajit Ray) - Preventing Unauthorized Data Flows
  (Emre Uzun, Gennaro Parlato, Vijay Atluri, Anna Lisa Ferrara, Jaideep 
  Vaidya, Shamik Sural and David Lorenzi)

10:30 - 11:00 Coffe break

11:00 - 12:40 SECURITY IN NETWORKS AND WEB
- Securing Networks against Unpatchable and Unknown Vulnerabilities Using
  Heterogeneous Hardening Options
  (Daniel Borbor, Lingyu Wang, Sushil Jajodia and Anoop Singhal) - Online
Review Spam Dectection through Content-Aware Trust Propagation
  (Hao Xue and Fengjun Li) - Securing Web Applications with Predicate Access
Control
  (Zhaomo Yang and Kirill Levchenko) - A Distributed Mechanism to Protect
against DDoS Attacks
  (Negar Mosharraf, Anura Jayasumana and Indrakshi Ray)

12:40 - 14:10 Lunch

14:10 - 15:40 SECURE STORAGE IN THE CLOUD
- High-Speed High-Security Public Key Encryption with Keyword Search
  (Rouzbeh Behnia, Attila Altay Yavuz and Muslum Ozgur Ozmen) - HardIDX:
Practical and Secure Index with SGX
  (Benny Fuhry, Raad Bahmani, Ferdinand Brasser, Florian Hahn, Florian
Kerschbaum 
  and Ahmad-Reza Sadeghi) - A Novel Cryptographic Framework for Cloud File
Systems and CryFS, a 
  Provably-Secure Construction
  (Sebastian Messmer, Jochen Rill, Dirk Achenbach and Joern Mueller-Quade)

15:40 - 16:10 Coffe break

16:10 - 17:40 ACCESS CONTROL 2
- Object-Tagged RBAC Model for the Hadoop Ecosystem
  (Maanak Gupta, Farhan Patwa and Ravi Sandhu) - Identification of Access
Control Policy Sentences from Natural Language 
  Policy Documents
  (Masoud Narouei and Hassan Takabi) - Fast Distributed Evaluation of
Stateful Attribute-Based Access Control 
  Policies
  (Thang Bui, Scott Stoller and Shikhar Sharma)


Friday, July 21st, 2017
--------------------------

09:00 - 10:30 CLOUD SECURITY 1
- Towards Actionable Mission Impact Assessment in the Context of Cloud
computing
  (Xiaoyan Sun, Anoop Singhal and Peng Liu) - Reducing Security Risks of
Clouds through Virtual Machine Placement
  (Jin Han, Wanyu Zang, Songqing Chen and Meng Yu) - Firewall Policies
Provisioning through SDN in the Cloud
  (Nora Cuppens, Salaheddine Zerkane, Li Yanhuang, David Espes, Philippe Le
Parc 
  and Frederic Cuppens)

10:30 - 11:00 Coffe break

11:00 - 12:20 CLOUD SECURITY 2
- Budget-constrained Result Integrity Verification of Outsourced Data Mining

  Computations
  (Bo Zhang, Boxiang Dong and Hui Wang) - Searchable Encryption to Reduce
Encryption Degradation in Adjustably 
  Encrypted Databases
  (Florian Kerschbaum and Martin Harterich) - Efficient Protocols for
Private Database Queries
  (Tushar Kanti Saha, Mayank and Takeshi Koshiba) - Toward Group-Based
User-Attribute Policies in Azure-like Access Control Systems
  (Anna Lisa Ferrara, Anna Squicciarini and Cong Liao)

12:20 - 12:30 Closing remarks


MORE INFORMATION

Additional information about the conference can be found at
https://dbsec2017.ittc.ku.edu/



Maggiori informazioni sulla lista dbitaly