Symposium Programme


Monday, June 6, 2011
9:00am - 10:00am Keynote
Policy Specification and Enforcement in Emerging Scenarios (slides)
Speaker: Pierangela Samarati
10:00am - 10:30am COFFEE BREAK
10:30am - 12:00pm Session 1: Policy Models and Languages - Chair: Pierangela Samarati
Full Papers FLAVOR: A Formal Language for A posteriori Verification of Legal Rules (slides)
Romuald Thion, Université Lyon, France.
Daniel Le Métayer, INRIA, France.
Rigorous Analysis of UML Access Control Policy Models (slides)
Wuliang Sun, Robert France and Indrakshi Ray. Colorado State University, USA.
Realization of User Level Fault Tolerant Policy Management through a Holistic Approach for Fault Correlation
Byung-Hoon Park, Thomas Naughton, Pratul Agarwal, David Bernholdt, Al Geist, Oak Ridge National Laboratory, USA.
Jennifer L. Tippens, Information Technology Services Division, Oak Ridge National Laboratory, USA.
12:00pm - 1:00pm EU-FP8 Talk
ICT FP7 Call 8: Objective 1.4 Trustworthy ICT (slides)
Speaker: Vilija Juceviciene, European Commission, Unit 5 - Trust and Security
1:00pm - 2:30pm LUNCH BREAK
2:30pm - 3:45pm Session 2: Short Papers - Chair: Fabio Massacci
Short Papers A Policy Language for Abstraction and Automation in Application-oriented Access Controls: The Functionality-based Appliction Confinement Policy Language (slides)
Z. Cliffe Schreuders, Christian Payne, Tanya McGill, Murdoch University, Australia.
GPF: A General Policy Framework
Steve Barker, King's College, UK.
Gillian Lowen, Technologica, UK.
Policy of Composition ≠ Composition Policies (slides)
Sebastian Speiser, Karlsruhe Service Research Institute, Germany.
Automatic Policy Rule Extraction for Configuration Management (slides)
Ron Banner, Omer Barkol, Ruth Bergman, Shahar Golan, HP Labs, Israel.
Yuval Carmel, Ido Ish-Hurwitz, Oded Zilinsky, HP Software, Israel.
Profile-based Selection of Accountability Policies in Grid Computing Systems
Wonjun Lee, Electrical & Computer Engineering, Purdue University, USA.
Anna C. Squicciarini, The Pennsylvania State University, USA.
Elisa Bertino, Computer Science, Purdue University, USA.
4:00pm - 4:30pm COFFEE BREAK
4:30pm - 6:00pm Poster and Demo Session
Inter-domain Multi-Hop Negotiation for the Internet
Hasan T. Karaoglu and Murat Yuksel, University of Nevada, USA.
CARE-CPS: Context-Aware tRust Evaluation for Wireless Networks in Cyber-Physical System Using Policies
Wenjia Li, Pramod Jagtap, Laura Zavala, Anupam Joshi and Tim Finin, University of Maryland, USA.
Demonstration of Policy-Guided Data Preservation using iRODS
Mike Conway, Reagan Moore, Arcot Rajasekar, University of North Carolina, USA.
Jean-Yves Nief, CNRS, France.
Enforcing Multi-user Access Policies to Encrypted Cloud Databases
Mihaela Ion, Giovanni Russello, CREATE-NET International Research Center, Italy.
Bruno Crispo, University of Trento, Italy.
Policy Supersession in a Coalition ISR Network
Keith Grueneberg, David Wood, Xiping Wang, Seraphin Calo and Maroun Touma, IBM Research, USA.
A Multi-Environment Application of Privacy Data Envelopes
Mahmoud Ghorbel, Armen Aghasaryan, Marie-Pascale Dupont, Stéphane Betgé-Brezetz, Guy-Bertrand Kamga and Sophie Piekarec, Alcatel-Lucent Bell Labs, France.
A Security Framework for Systems of Systems
Daniel Trivellato, Nicola Zannone University of Twente, Netherlands.
Sandro Etalle, Eindhoven University of Technology, Netherlands.
PPL: PrimeLife Privacy Policy Engine
Slim Trabelsi, Jakub Sendor, Stefanie Reinicke, SAP Research, France.
(SC)2: a System to Secure Off-Card Contract Policy Matching in Security-by-Contract for Open Multi-Application Smart Cards
Nicola Dragoni, Eduardo Lostal and Davide Papini, DTU Informatics, Denmark.
Using MiniZnMASC Middleware with Different Algorithms for Business-Driven Adaptation of Business Processes
Qinghua Lu, University of New South Wales, Australia.
Vladimir Tosic, Software Systems, NICTA, Australia.
WS-Governance Tooling: SOA Governance Policies
Antonio Manuel Gutierrez, José Antonio Parejo, Pablo Fernandez and Antonio Ruiz-Cortés, University of Seville, Spain.
6:00pm - 7:30pm Welcome Cocktail
Tuesday, June 7, 2011
9:00AM - 10:00am Keynote
The Utility of Utility: Policies for Self-Managing Systems (slides)
Speaker: Jeffrey Kephart
10:00am - 10:30amCOFFEE BREAK
10:30am - 12:00pm Session 3: Privacy and Security - Chair: Arosha Bandara
Full Papers Computer-Aided Generation of Enforcement Mechanisms for Error-Tolerant Policies (slides)
Nataliia Bielova and Fabio Massacci, University of Trento, Italy.
A Framework for Managing and Analyzing Changes of Security Policies (slides)
Achim Brucker and Helmut Petritsch, SAP Research, Germany.
Behavior-Based Policies for Preserving Confidentiality in PCE-based Multi-Domain MPLS networks (slides)
Molka Gharbaoui, Francesco Paolucci, Barbara Martini, Filippo Cugini, Piero Castoldi, Scuola Superiore Sant'Anna, Pisa, Italy.
12:00pm - 1:00pm Session 4: Short Papers - Chair: Marco Casassa
Short Papers PrimAndroid: Privacy Policy Modelling and Analysis for Android Applications (slides)
Guillaume Benats, Arosha Bandara, Yijun Yu, Jean-Noel Colin and Bashar Nuseibeh, The Open University, UK.
Information Flow Control for Static Enforcement of User-defined Privacy Policies (slides)
Sören Preibusch, University of Cambridge, UK.
Risk Assessment and Decision Support for Security Policies and Related Enterprise Operational Processes (slides)
Marco Casassa Mont and Richard Brown, Hewlett-Packard Labs, UK.
Authoring and Deploying Policies Dynamically for Compliance Monitoring (slides)
Yurdaer Doganata, Keith Grueneberg, John Karat and Nirmal Mukhi, IBM Research, USA.
1:00pm-2:30pm LUNCH BREAK
2:30pm - 4:00pm Session 5: Mobility - Chair: Jeffrey Kephart
Full Papers A Policy-Based Simulator for Assisted Adaptive Vertical Handover (slides)
Ismaeel Al Ridhawi, Nancy Samaan and Ahmed Karmouch, University of Ottawa, Canada.
Distributed Overlay Construction to Support Privacy-Based Access Control (slides)
Bong Jun Ko, Starsky H.Y. Wong, Kang-Won Lee, IBM T.J. Watson Research Center, USA.
Chi-Kin Chau, University of Cambridge, UK.
Policy-Based Access Control in Mobile Social Ecosystems (slides)
Sara Hachem, Alessandra Toninelli, Animesh Pathak and Valerie Issarny, INRIA Paris-Rocquencourt, France.
4:00pm - 4:30pm COFFEE BREAK
4:30pm - 6:00pm Panel Session: The Policy Decade - has it delivered?
Panel Chair: Morris Sloman
Panel Members: Fabio Massacci, Arosha Bandara, Jeffrey Kephart and Morris Sloman.
Slides for Fabio Massacci's address
Slides for Arosha Bandara's address
Slides for Jeffrey Kephart's address
Slides for Morris Sloman's address
8:00pm - 11:00pm Social Dinner
Wednesday, June 8, 2011
9:00am - 10:00amKeynote
Data-Centric Usage Control Enforcement
Speaker: Alexander Pretschner
10:00am - 10:30amCOFFEE BREAK
10:30am - 1:00pmSession 6: Applications - Chair: Alexander Pretschner
Full PapersTowards Run-time Verification in Access Control (slides)
Fatih Turkmenm, Bruno Crispo, University of Trento, Italy.
Eunjin Jung, University of San Francisco, USA.
Tool-Supported Refinement of High-Level Requirements and Constraints into Low-Level Policies (slides)
Oliver Dohnhof, Jan Kruger, Heiko Krumm, TU Dortmund University, Germany.
Christoph Fiehe, Anna Litvina, Ingo Luck and Franz-Joseph Stewing, MATERNA Information & Communications, Germany.
A Virtualization Assurance Language for Isolation and Deployment (slides)
Soren Bleikertz and Thomas Grob, IBM Research Zürich, Switzerland.
iLayer: Toward an Application Access Control Framework for Content Management System (slides)
Gorrell Cheek, Mohamed Shehab, Truong Ung, Ebonie Williams, University of North Carolina, USA.
Lifecycle Management of Relational Records for External Auditing and Regulatory Compliance (slides)
Ahmed A. Ataullah and Frank Wm. Tompa, University of Waterloo, Canada.
1:00pm - 2:30pmLUNCH BREAK
2:30pm - 4:00pmSession 7: Short Papers - Chair: Steve Barker
Short Papers Hard Disk Guard Based Policy Enforcement (slides)
Mark Beaumont, Chris North, Bradley Hopkins, Ken Yiu, Defence Science and Technology Organisation, Australia.
A Model-Driven Approach for Incorporating Reactive Rules in Declarative Interactive TV Applications (slides)
Patricia Dockhorn Costa, João Paulo A. Almeida, Igor Magri Vale and Izon Thomaz Mielke, Federal University of Espirito Santo, Brazil.
Policy-Based Integration of Provenance Metadata (slides)
Ashish Gehani, Dawood Tariq, Basim Baig, SRI International, USA.
Tanu Malik, University of Chicago, USA.
A Load Time Policy Checker for Open Multi-Application Smart Cards (slides)
Nicola Dragoni, Eduardo Lostal, Technical University of Denmark, Denmark.
Olga Gadyatskaya, Fabio Massacci, Federica Paci, University of Trento, Italy.
Addressing Data Reuse Issues at the Protocol Level (slides)
Oshani Seneviratne, Lalana Kagal, MIT Computer Science and Artificial Intelligence Lab, USA.