DBSec 2016 |
08:30–9:15 | Welcome and Registration |
09:15–9:30 | Opening Remarks |
09:30–10:30 | Session 1 (Chair: Silvio Ranise) |
10:30–11:00 | Coffee Break |
11:00–12:30 | Session 2 |
Session 2
11:00
Deciphering Text from Touchscreen Key Taps
Haritabh Gupta, Shamik Sural, Vijayalakshmi Atluri and Jaideep Vaidya 11:30
The Fréchet/Manhattan distance and the trajectory anonymisation problem
Christof Ferreira Torres and Rolando Trujillo 12:00
Whom You Gonna Trust? A Longitudinal Study on TLS Notary Services
Georg Merzdovnik, Klaus Falb, Martin Schmiedecker, Artemios Voyiatzis and Edgar Weippl |
|
12:30–14:00 | Lunch |
14:00–15:30 | Session 3 |
Session 3
14:00
Inter-ReBAC: Inter-operation of relationship-based access control model instances
Jason Crampton and James Sellwood 14:20
Enhanced Functionality and Confidentiality for Database Search and Publish/Subscribe Protocols
Giovanni Di Crescenzo, Thimios Panagos and Brian Coan 14:40
A Comparison of Logical-formula and Enumerated Authorization Policy ABAC Models
Prosunjit Biswas, Ravi Sandhu and Ram Krishnan 15:00
Access Control for the Shuffle Index
Sabrina De Capitani di Vimercati, Sara Foresti, Stefano Paraboschi, Gerardo Pelosi and Pierangela Samarati |
|
15:30–16:00 | Coffee Break |
16:00–17:30 | Session 4 |
Session 4
16:00
Guaranteeing correctness of bulk operations in outsourced databases
Luca Ferretti, Michele Colajanni and Mirco Marchetti 16:30
Privacy Preserving Probabilistic Record Linkage Using Locality Sensitive Hashes
Ibrahim Lazrig, Toan Ong, Indrajit Ray, Indrakshi Ray and Michael Kahn 17:00
Runtime detection of zero-day vulnerability exploits in contemporary software systems
Olgierd Pieczul and Simon Foley |
|
17:30–18:00 | Business Meeting |
18:00 | Welcome Reception |
Tuesday, July 19
09:30–10:30 | Session 5 (Chair: Silvio Ranise) |
10:30–11:00 | Coffee Break |
11:00–12:30 | Session 6 |
Session 6
11:00
Data Governance & Transparency for Collaborative Systems
Rauf Mahmudlu, Jerry Den Hartog and Nicola Zannone 11:30
Sharing-habits based privacy control in social networks
Silvie Levy, Ehud Gudes and Nurit Gal-Oz 12:00
Counteracting active attacks in social network graphs
Sjouke Mauw, Rolando Trujillo and Bochuan Xuan |
|
12:30–14:00 | Lunch |
14:00–15:30 | Session 7 (Chair: Artemios G. Voyiatzis - SBA Research, Austria) |
Session 7
14:00
Practical Differentially Private Modeling of Human Movement Data
Harichandan Roy, Murat Kantarcioglu and Latanya Sweeney 14:20
Towards Creating HoneyProjects for Detecting Data Theft
Stefan Thaler, Jerry den Hartog and Milan Petkovic 14:40
Private and Secure Secret Shared MapReduce
Shlomi Dolev, Shantanu Sharma and Yin Li 15:00
A Practical Framework for Executing Complex Queries over Encrypted Multimedia Data
Fahad Shaon and Murat Kantarcioglu |
|
15:30–16:00 | Coffee Break |
16:00–17:20 | Session 8 |
Session 8
16:00
Mining Hierarchical Temporal Roles with Multiple Metrics
Scott Stoller and Thang Bui 16:30
Formalizing Threat Models for Virtualized Systems
Daniele Sgandurra, Erisa Karafili and Emil Lupu 17:00
CheapSMC: A Framework to Minimize SMC Cost in Cloud
Erman Pattuk, Murat Kantarcioglu, Huseyin Ulusoy and Brad Malin |
|
5.45pm | Guided City Tour (starting from FBK Santa Croce) |
8.00pm | Social Dinner - Forst Restaurant Trento (Via Oss-Mazzurana 38, Trento) Website |
Wednesday, July 20
09:30–10:30 | Session 9 |
Session 9
9:30
Role-Centric Circle of Trust in Multi-Tenant Cloud IaaS
Navid Pustchi and Ravi Sandhu 10:00
Reasoning About Firewall Policies Through Refinement and Composition
Ultan Neville and Simon Foley |
|
10:30–11:00 | Coffee Break |
11:00–12:00 | Session 10 |
Session 10
11:00
Diversifying Network Services under Cost Constraints for Better Resilience
against unknown attacks Daniel Borbor, Lingyu Wang, Sushil Jajodia and Anoop Singhal 11:30
Reasoning about Privacy Properties of Architectures Supporting Group Authentication
and Application to Biometric Systems Julien Bringer, Hervé Chabanne, Daniel Le Métayer and Roch Lescuyer |
|
12:00–12:15 | Closing remarks |
12:15–14:00 | Lunch |