Program


(Reception and Social Event to be announced)

Wednesday, July 19, 2017

8:30 - 9:15 Registration
9:15 - 9:30 Conference Opening and Welcome
09:30 - 10:30 KEYNOTE SPEECH: Attribute-Based Access Control: Insights and Challenges
Ravi Sandhu, University of Texas at San Antonio, USA
10:30 - 11:00 Coffee break
11:00 - 12:30 PRIVACY 1
Gaussian Mixture Models for Classification and Hypothesis Tests under Differential Privacy
Xiaosu Tong, Bowei Xi, Murat Kantarcioglu and Ali Inan
Differentially Private k-Skyband Query Answering through Adaptive Spatial Decomposition
Ling Chen, Ting Yu and Rada Chirkova
Mutually private location proximity detection with access control
Michael Solomon, Vaidy Sunderam, Li Xiong and Ming Li
12:30 - 14:00 Lunch
14:00 - 15:20 SECURE SYSTEMS
Keylogger Detection Using a Decoy Keyboard
Seth Simms, Margot Maxwell, Sara Johnson and Julian Rrushi
The fallout of key compromise in a proxy-mediated key agreement protocol
David Nunez, Isaac Agudo and Javier Lopez
Improving resilience of behaviometric based continuous authentication with multiple accelerometers
Tim Van Hamme, Davy Preuveneers and Wouter Joosen
15:20 - 15:50 Coffee break
15:50 - 17:30 PRIVACY 2
Privacy-preserving elastic net for data encrypted by different keys - with an application on biomarker discovery
Jun Zhang, Meiqi He and Siu Ming Yiu
Privacy-Preserving Community-Aware Trending Topic Detection in Online Social Media
Theodore Georgiou, Amr El Abbadi and Xifeng Yan
Privacy-Preserving Outlier Detection for Data Streams
Jonas Boehler, Daniel Bernau and Florian Kerschbaum
Undoing of privacy through innocuous actions
Vishwas Patil and R K Shyamasundar
17:30 - 18:00 Business Meeting

Thursday, July 20th, 2017

09:00 - 10:30 ACCESS CONTROL 1
Cryptographically Enforced Role-Based Access Control for NoSQL Distributed Databases
Yossif Shalabi and Ehud Gudes
Resilient Reference Monitor for Distributed Access Control via Moving Target Defense
Dieudonne Mulamba and Indrajit Ray
Preventing Unauthorized Data Flows
Emre Uzun, Gennaro Parlato, Vijay Atluri, Anna Lisa Ferrara, Jaideep Vaidya, Shamik Sural and David Lorenzi
10:30 - 11:00 Coffee break
11:00 - 12:40 SECURITY IN NETWORKS AND WEB
Securing Networks against Unpatchable and Unknown Vulnerabilities Using Heterogeneous Hardening Options
Daniel Borbor, Lingyu Wang, Sushil Jajodia and Anoop Singhal
Online Review Spam Dectection through Content-Aware Trust Propagation
Hao Xue and Fengjun Li
Securing Web Applications with Predicate Access Control
Zhaomo Yang and Kirill Levchenko
A Distributed Mechanism to Protect against DDoS Attacks
Negar Mosharraf, Anura Jayasumana and Indrakshi Ray
12:40 - 14:10 Lunch
14:10 - 15:40 SECURE STORAGE IN THE CLOUD
High-Speed High-Security Public Key Encryption with Keyword Search
Rouzbeh Behnia, Attila Altay Yavuz and Muslum Ozgur Ozmen
HardIDX: Practical and Secure Index with SGX
Benny Fuhry, Raad Bahmani, Ferdinand Brasser, Florian Hahn, Florian Kerschbaum and Ahmad-Reza Sadeghi
A Novel Cryptographic Framework for Cloud File Systems and CryFS, a Provably-Secure Construction
Sebastian Messmer, Jochen Rill, Dirk Achenbach and Joern Mueller-Quade
15:40 - 16:10 Coffee break
16:10 - 17:40 ACCESS CONTROL 2
Object-Tagged RBAC Model for the Hadoop Ecosystem
Maanak Gupta, Farhan Patwa and Ravi Sandhu
Identification of Access Control Policy Sentences from Natural Language Policy Documents
Masoud Narouei and Hassan Takabi
Fast Distributed Evaluation of Stateful Attribute-Based Access Control Policies
Thang Bui, Scott Stoller and Shikhar Sharma

Friday, July 21st, 2017

9:00 - 10:30 CLOUD SECURITY 1
Towards Actionable Mission Impact Assessment in the Context of Cloud computing
Xiaoyan Sun, Anoop Singhal and Peng Liu
Reducing Security Risks of Clouds through Virtual Machine Placement
Jin Han, Wanyu Zang, Songqing Chen and Meng Yu
Firewall Policies Provisioning through SDN in the Cloud
Nora Cuppens, Salaheddine Zerkane, Li Yanhuang, David Espes, Philippe Le Parc and Frederic Cuppens
10:30 - 11:00 Coffee break
11:00 - 12:20 CLOUD SECURITY 2
Budget-constrained Result Integrity Verification of Outsourced Data Mining Computations
Bo Zhang, Boxiang Dong and Hui Wang
Searchable Encryption to Reduce Encryption Degradation in Adjustably Encrypted Databases
Florian Kerschbaum and Martin Harterich
Efficient Protocols for Private Database Queries
Tushar Kanti Saha, Mayank and Takeshi Koshiba
Toward Group-Based User-Attribute Policies in Azure-like Access Control Systems
Anna Lisa Ferrara, Anna Squicciarini and Cong Liao
12:20 - 12:30 Closing remarks