Program of the 6th Secure Data Management Workshop

PROGRAM OVERVIEW

Friday, August 28, 2009

09.15 – 09.30 Welcome

09.30 – 10.30 Access Control I

10.30 – 11.00 Coffee Break

11.00 – 12.30 Privacy Protection

12.30 – 14.00 Lunch

14.00 – 15.30 Database security

15.30 – 16.00 Coffee Break

16.00 – 17.00 Access Control II

 

COMPLETE PROGRAM

Friday, August 28, 2009

09.15-09.30 Welcome

Co-chairs

09.30-10.30 Access Control I

An Access Control Language for a General Provenance Model

Qun Ni, Shouhuai Xu, Elisa Bertino, Ravi Sandhu, Weili Han

A Flexible Access Control Model for Distributed Collaborative Editors

Abdessamad Imine, Asma Cherif, Michael Rusinowitch

---------------------------------------------------------------------------

10.30-11.00 Coffee Break

---------------------------------------------------------------------------

11.00-12.30 Privacy Protection

Longitude: Centralized Privacy-Preserving Computation of Users' Proximity

Sergio Mascetti, Claudio Bettini, Dario Freni

Query Optimization in Encrypted Relational Databases by Vertical Schema Partitioning

Mustafa Canim, Murat Kantarcioglu, Ali Inan

L-Cover: Preserving Diversity by Anonymity

Lei Zhang, Lingyu Wang, Sushil Jajodia, Alexander Brodsky

---------------------------------------------------------------------------

12.30-14.00 Lunch

---------------------------------------------------------------------------

14.00-15.30 Database Security

Do You Know Where Your Data's Been? - Tamper-Evident Database Provenance

Jing Zhang, Adriane Chapman, Kristen LeFevre

Database Intrusion Detection Using Role Pro ling with Role Hierarchy

Gafield Zhiping Wu, Sylvia L. Osborn, Xin Jin

Query Processing Techniques for Compliance with Data Confidence Policies

Chenyun Dai, Dan Lin, Murat Kantarcioglu, Elisa Bertino, Ebru Celikel, Bhavani Thuraisingham

---------------------------------------------------------------------------

15.30-16.00 Coffee Break

---------------------------------------------------------------------------

16.00-17.00 Access Control II

On the Construction and Verification of Self-modifying Access Control Policies

David Power, Mark Slaymaker, Andrew Simpson

Controlling Access to XML Documents over XML Native and Relational Databases

George Chinis, Lazaros Koromilas, Irini Fundulaki, Sotiris Ioannidis

---------------------------------------------------------------------------


back


Page Last Updated on July 18, 2009