DBSec'00 -- PRELIMINARY CONFERENCE PROGRAM
Date: 2000/05/31
Message-ID: <3934a024_at_naylor.cs.rmit.edu.au>
PRELIMINARY CONFERENCE PROGRAM 14th IFIP 11.3 Working Conference in Database Security Schoorl, The Netherlands August 21-23, 2000 http://www.cs.vu.nl/ifip-2000/
Monday, August 21, 2000
8:30 - 9:00am Welcome
Reind van der Riet (General Chair)
Bhavani Thuraisingham (Program Chair, The Americas)
Klaus Dittrich (Program Chair, Europe/Africa)
Zahir Tari (Program Chair, Australasia)
9:45 - 9:45am Keynote I
Gio Widerhold, Stanford University, USA
9:45 - 11:00 am XML, E-Commerce and Security
Author-X: a Java-Based System for XML Data Protection
E. Bertino, M. Braun, S. Castano, E. Ferrari, M. Mesiti
A Fair-exchange E-commerce Protocol with Automated Dispute Resolution
Indrajit Ray, Indrakshi Ray, Natarajan Narasimhamurthy
XML Access Control Systems: A Component-Based Approach
Ernesto Damiani, Sabrina De Capitani di Vimercati, Stefano
Paraboschi, Pierangela Samarati
11:00 - 11:15am Coffee Break
11:15 - 12:30pm Security Architectures and Distributed Objects
A Configurable Security Architecture Prototype
Alexandre Hardy, Martin S. Olivier
Distributed Policies for Data Management Making Policies Mobile
Susan Chapin, Don Faatz, Sushil Jajodia
Security Architecture of the Multimedia Mediator
Christian Altenschmidt, Joachim Biskup, Yucel Karabulut
12:30 - 12:00 pm Lunch
2:00 - 3:50 pm Encryption and Related Security Mechanisms
Simulation and Analysis of Cryptographic Protocols
M. Papa, O. Bremer, S. Magill, J. Hale, S. Shenoi
Encryption in Relational Database Management Systems
Jingmin He, Min Wang
Authentic Third-party Data Publication
Prem Devanbu, Michael Gertz, Chip Martel Stuart G.
Stubbleline, Davis California
Protecting File systems Against Corruption Using Checksums
Daniel Barbara, Rajni Goel, Sushil Jajodia
3:50 - 4:15 pm Tea Break
4:15 - 5:45 pm
Panel on E-Commerce, XML, Web and Security: Developments and
Challenges
Moderator: Bhavani Thuraisingham
Panelists: To be announced
7:00 - 8:00 pm Musical Concert (by Conference Participants)
8:00 - 10:00 pm Dinner
Tuesday, August 22, 2000
8:30 - 9:15 am Keynote II
Ken Moody, University of Cambridge, England
9:15 - 10:55 am Secure Federations and Frameworks
Integrating Security Policies in Federated Database Systems
Marta Oliva, Felix Saltor
Wrappers - a mechanism to support state-based
authorisation in Web applications
Martin S. Olivier, Ehud Gudes
An Integrated Framework for Database Privacy Protection
LiWu Chang, Ira S. Moskowitz
Identifying Security Holes in OLAP Applications
J. Steger, H. Gunzel
10:55 - 11:15 am Coffee Break
11:15 - 12:30pm Multilevel Security and Related Issues
Discovery of Multi-Level Security Policies
Christina Yip Chung, Michael Gertz, Karl Levitt
Protecting Deductive Databases from Unauthorized Retrievals
Steve Barker
Confidentiality vs Integrity in Secure Databases
Adrian Spalka, Armin B. Cremers
12:30 - 1:30 pm Lunch
1:30 - 2:30 pm Business Meeting
Chair: John Dobson, Pierangela Samarati
2:30 - 6:00 pm Afternoon Off / Excursion on Your Own
6:00 - 10:00 pm BBQ/Dinner by North Sea
Wednesday, August 23, 2000
8:30 - 9:15 am Keynote III
Kristin Nauta, Director SAS Institute
9:15 - 10:30am Language Security and Novel Applications
Extending SQL's Grant and Revoke Operations, to Limit and Reactivate
Privileges
Arnon Rosenthal, Edward Sciore
Language Extensions for Programmable Security
John Hale, Rodrigo Chandia, Clinton Campbell, Sujeet Shenoi
Protecting Privacy from Continuous High-resolution Satellite
Surveillance
Soon Ae Chun, Vijayalakshmi Alturi
10:30 - 10:45am Coffee Break
10:45 am - 12:00 noon Role-Based and Workflow Security
Database Security Integration using Role-Based Access Control
Sylvia Osborn
Role-Based Security in a Distributed Resource Environment
S. A. Demurjian, T. C. Ting, J. Balthazar, H. Ren,
C. Phillips, P. Barr
WorkFlow Analyzed for Security and Privacy in using Databases
Wouter Teepe, Reind van der Riet, Martin Olivier
12:00 - 2:00 pm Extended Lunch for checkout
2:00 - 4:00 pm
12 SHORT PAPERS (10 minutes each)
Database Security 2000
John R. Campbell
Declarative Semantics of Belief Queries in MLS Deductive Databases
Hasan M. Jamil
The Need for Trust Management in OLAP Tools
Leonard T. Gaines, James B. Michael
Intelligible Access Control - Policy, Mechanism, and
Scalable Verification
Marc Donner, David Nochin, Dennis Shasha
Active Access Control as High-Level Control
Daniel Cvrcek
Chinese Wall Security Policy Revisited
T. Y. Lin
Access Control Model in Object-Oriented Systems
Keiji Izaki, Katsuya Tanaka, Makoto Takizawa
Method of Synthesis of Information Protection Systems
Oleg Gatsenko
Prefix Codes based Symmetric Crypt-Algorithms
Dongyag Long, Weijia Jia, Chan H. Lee
Temporaral-Probablistic Network Approach for Anomaly Intrusion
Detection
Alaxandr Saleznyov, Vagan Terziyan, Seppo Puuronen
Conference Key Agreement Protocol Using Oblivious Transfer
Ari Moesriami Barmawi, Shinga Takada, Norihisa Doi
An Improved Access Control Model for Enterprise Environment
Oh Sejong, Park Seog
4:00 - 4:15 pm Tea Break
4:15 - 5:45 pm
Panel: Directions for Securer Data and Applications Security
Moderator: Reind van der Riet
Panelists: To be announced
CLOSING REMARKS Reind van der Riet
Bhavani Thuraisingham
Klaus Dittrich
Zahir Tari Received on Wed May 31 2000 - 00:00:00 CEST