DBSec'00 -- PRELIMINARY CONFERENCE PROGRAM

From: Zahir Tari <zahirt_at_goanna.cs.rmit.edu.au>
Date: 2000/05/31
Message-ID: <3934a024_at_naylor.cs.rmit.edu.au>


                      PRELIMINARY CONFERENCE PROGRAM


	14th IFIP 11.3 Working Conference in Database Security

			  Schoorl, The Netherlands


		             August 21-23, 2000


		       http://www.cs.vu.nl/ifip-2000/

Monday, August 21, 2000


8:30 - 9:00am Welcome

     Reind van der Riet (General Chair)

     Bhavani Thuraisingham (Program Chair, The Americas)

     Klaus Dittrich (Program Chair, Europe/Africa)

     Zahir Tari (Program Chair, Australasia)

9:45 - 9:45am Keynote I

     Gio Widerhold, Stanford University, USA

9:45 - 11:00 am XML, E-Commerce and Security

     Author-X: a Java-Based System for XML Data Protection

     E. Bertino, M. Braun, S. Castano, E. Ferrari, M. Mesiti

     A Fair-exchange E-commerce Protocol with Automated Dispute Resolution

     Indrajit Ray, Indrakshi Ray, Natarajan Narasimhamurthy

     XML Access Control Systems: A Component-Based Approach

     Ernesto Damiani, Sabrina De Capitani di Vimercati, Stefano

     Paraboschi, Pierangela Samarati

11:00 - 11:15am Coffee Break

11:15 - 12:30pm Security Architectures and Distributed Objects       

      A Configurable Security Architecture Prototype

      Alexandre Hardy, Martin S. Olivier

      Distributed Policies for Data Management Making Policies Mobile

      Susan Chapin, Don Faatz, Sushil Jajodia

      Security Architecture of the Multimedia Mediator

      Christian Altenschmidt, Joachim Biskup, Yucel Karabulut

12:30 - 12:00 pm Lunch

2:00 - 3:50 pm Encryption and Related Security Mechanisms

     Simulation and Analysis of Cryptographic Protocols

     M. Papa, O. Bremer, S. Magill, J. Hale, S. Shenoi

     Encryption in Relational Database Management Systems

     Jingmin He, Min Wang

     Authentic Third-party Data Publication

     Prem Devanbu, Michael Gertz, Chip Martel Stuart G.

         Stubbleline, Davis California

     Protecting File systems Against Corruption Using Checksums

     Daniel Barbara, Rajni Goel, Sushil Jajodia

3:50 - 4:15 pm Tea Break

4:15 - 5:45 pm

       Panel on E-Commerce, XML, Web and Security: Developments and

                                                   Challenges

        Moderator: Bhavani Thuraisingham

        Panelists: To be announced

7:00 - 8:00 pm Musical Concert (by Conference Participants)

8:00 - 10:00 pm Dinner

Tuesday, August 22, 2000


8:30 - 9:15 am Keynote II

        Ken Moody, University of Cambridge, England

9:15 - 10:55 am Secure Federations and Frameworks

     Integrating Security Policies in Federated Database Systems

     Marta Oliva, Felix Saltor

     Wrappers - a mechanism to support state-based

              authorisation in Web applications

     Martin S. Olivier, Ehud Gudes

     An Integrated Framework for Database Privacy Protection

     LiWu Chang, Ira S. Moskowitz

     Identifying Security Holes in OLAP Applications

     J. Steger, H. Gunzel

10:55 - 11:15 am Coffee Break

11:15 - 12:30pm Multilevel Security and Related Issues

      Discovery of Multi-Level Security Policies

      Christina Yip Chung, Michael Gertz, Karl Levitt

      Protecting Deductive Databases from Unauthorized Retrievals

      Steve Barker

      Confidentiality vs Integrity in Secure Databases

      Adrian Spalka, Armin B. Cremers

12:30 - 1:30 pm Lunch

1:30 - 2:30 pm Business Meeting

                Chair: John Dobson, Pierangela Samarati

2:30 - 6:00 pm Afternoon Off / Excursion on Your Own

6:00 - 10:00 pm BBQ/Dinner by North Sea

Wednesday, August 23, 2000


8:30 - 9:15 am Keynote III

        Kristin Nauta, Director SAS Institute

9:15 - 10:30am Language Security and Novel Applications

     Extending SQL's Grant and Revoke Operations, to Limit and Reactivate

               Privileges

     Arnon Rosenthal, Edward Sciore

     Language Extensions for Programmable Security

     John Hale, Rodrigo Chandia, Clinton Campbell, Sujeet Shenoi

     Protecting Privacy from Continuous High-resolution Satellite

                Surveillance

     Soon Ae Chun, Vijayalakshmi Alturi

10:30 - 10:45am Coffee Break

10:45 am - 12:00 noon Role-Based and Workflow Security

      Database Security Integration using Role-Based Access Control

      Sylvia Osborn

      Role-Based Security in a Distributed Resource Environment

      S. A. Demurjian, T. C. Ting, J. Balthazar, H. Ren,

         C. Phillips, P. Barr

      WorkFlow Analyzed for Security and Privacy in using Databases

      Wouter Teepe, Reind van der Riet, Martin Olivier

12:00 - 2:00 pm Extended Lunch for checkout

2:00 - 4:00 pm

     12 SHORT PAPERS (10 minutes each)

     Database Security 2000

     John R. Campbell

     Declarative Semantics of Belief Queries in MLS Deductive Databases

     Hasan M. Jamil

     The Need for Trust Management in OLAP Tools

     Leonard T. Gaines, James B. Michael

     Intelligible Access Control - Policy, Mechanism, and

                  Scalable Verification

     Marc Donner, David Nochin, Dennis Shasha

     Active Access Control as High-Level Control

     Daniel Cvrcek

     Chinese Wall Security Policy Revisited

     T. Y. Lin

     Access Control Model in Object-Oriented Systems

     Keiji Izaki, Katsuya Tanaka, Makoto Takizawa

     Method of Synthesis of Information Protection Systems

     Oleg Gatsenko

     Prefix Codes based Symmetric Crypt-Algorithms

     Dongyag Long, Weijia Jia, Chan H. Lee

     Temporaral-Probablistic Network Approach for Anomaly Intrusion

        Detection

     Alaxandr Saleznyov, Vagan Terziyan, Seppo Puuronen

     Conference Key Agreement Protocol Using Oblivious Transfer

     Ari Moesriami Barmawi, Shinga Takada, Norihisa Doi

     An Improved Access Control Model for Enterprise Environment

     Oh Sejong, Park Seog

4:00 - 4:15 pm Tea Break

4:15 - 5:45 pm

     Panel: Directions for Securer Data and Applications Security

     Moderator: Reind van der Riet

     Panelists: To be announced

CLOSING REMARKS         Reind van der Riet

        Bhavani Thuraisingham

        Klaus Dittrich

        Zahir Tari Received on Wed May 31 2000 - 00:00:00 CEST

Original text of this message