Ceisare |
|
|
|
|
LOCATION Marriott Buffalo-Niagara Website: http://marriott.com/property/propertyPage/BUFNY For accommodation, call Marriott Buffalo-Niagara directly and mention “Workshop on Secure Knowledge Management” to get the Workshop rate of $89 per night, single or double REGISTRATION Workshop Website: http://www.cse.buffalo.edu/caeiae/skm2004/ Registration Website: http://www.ubevents.org/regengine/index_event.php?eventid=72 THE PROGRAM DAY 1 Thursday, September 23, 2004 7:30 – 8:30 Breakfast/Registration 8:30 – 8:45 Welcome Address Satish Tripathi, Provost, University at Buffalo, State University of New York 8:45 – 9:30 Keynote Address Secure Knowledge Management Bhavani Thuraisingham, Program Director, Cyber Trust and Data and Applications Security at the National Science Foundation 9:30 – 10:15 Keynote Address National Cyber Security – Progress and Road Ahead Hun Kim, Director, Strategic Initiatives at the Department of Homeland Security, National Cyber Security Division 10:15 – 10:45 Coffee Break 10:45 – 12:00 SESSION 1A: Access Control and Rights Chair: John McDermott, Naval Research Laboratory Towards an Interdisciplinary Understanding of Trust and Rights Shiu-Kai Chin,
Professor and Director, CASE Center, Using Subject and Object Specific Attributes for Access control in Web-based Knowledge management Systems Gerald Stermsek, Mark Strembeck, and Gustaf Neumann, Vienna University of Economics, Austria Providing Technical Controls to Secure Federal Information Systems Stephanie Wettstein, TNT Communication, Portland, Oregon SESSION 1B: Trust and Privacy Chair: Mukesh Singhal, University of Kentucky (tentative) Private and Trusted Collaboration Bharat Bhargava, Purdue University (Invited Talk) Trust-based Security Policies Henry Hexmoor, Sandeep Bhattaram, and Seth Wilson, University of Arkansas Assessing the Effect of Deceptive Data in the Web of Trust Yi Hu, Brajendra Panda, and Yanjun Zuo, University of Arkansas 12:00 – 1:15 Lunch 1:15 – 2:45 SESSION 2A: Monitoring, Detection and Intrusion Response Chair: Olivia Sheng, University of Utah A Queuing Formulation of Intrusion Detection with Active and Passive Responses Wei T. Yue, Metin Cakanyildirim, and Young U. Ryu, University of Texas at Dallas Workflow Anomaly Detection in Secure Systems Timothy J. Smith, MCNC Research and Development Institute Detecting the Misappropriation of Information through Bottleneck Monitoring Terrance Goan and Matthew Broadhead, Stottler Henke Associates, Inc., Seattle, Washington Network Log Anonymization: Application of Crypto-PAn to Cisco Netflows Adam Slagell, Jun Wang, and William Yurcik, University of Illinois at Urbana-Champaign SESSION 2B: Security in Health Informatics Co-Chairs: Raj Sharman & Peter Winkelstein, University at Buffalo Data Access Control and Measure in the Development of Web-Based Health Insurance Systems Zhen Jiang, West Chester University A Policy-Based Security Mechanism for Distributed Heath Networks A. Onabajo, C. Obry and J.H. Jahnke, University of Victoria Securing Clinical Knowledge: Balancing Accessibility, Security, and Privacy in Dental Education Daniel W. Emmer and Ebrahim Randeree, State University of New York at Buffalo Securing Pervasive Networks using Biometrics V. Chavan, S. Chikkerrur, S. Tulyakov and V. Govindaraju, State University of New York at Buffalo 2:45 – 3:10 Coffee Break 3:10 – 4:15 Plenary Talks Chair: TBD Cyber-Identity, Authority and Trust in an Uncertain WorldRavi Sandhu, Department of Information and Software Engineering, George Mason University, Co-Founder of Securivacy (formerly, SingleSignOn.net) Patterns of Knowledge Management in Secure Environments Alan D. Marwick, Senior Manager, Knowledge Management, IBM T.J. Watson Research Center 4:15 – 5:45 Panel Discussion Moderator – Sharmistha Bagchi-Sen, University at Buffalo Women and Cyber Security – Gendered Tasks and Inequitable Outcomes Panelists: Margaret (Peg) Grayson President and CEO, V-One Corporation and Member, National Infrastructure Advisory Council Susan Patrick Director of Education Technology, U.S. Department of Education Bhavani Thuraisingham Program Director, Cyber Trust and Data and Applications Security at the National Science Foundation 6:15 – 7:30 Social Hour and Poster Session Posters Chair: TBD CDMS: Cyber Defense Management System Dipankar Dasgupta, University of Memphis Securing network traffic and intrusion detection data Benjamin D. Uphoff and Johnny S.K. Wong, Los Alamos National Laboratory and Iowa State University Creating Knowledge at the Cost of Privacy: A Case Study Karen Neville, Philip Powell, and Kevin O’Sullivan, N National University of Ireland – Cork, Ireland A Risk-aware Approach to Knowledge Management of Security Choices Scott Campbell and James Kiper, Miami University, Ohio Location Privacy in Geographical Routing for Mobile Ad Hoc Networks Weichao Wang and Bharat Bhargava, Purdue Universit Improving Security in Ad Hoc Networks through Integrated Architecture Xiaoxin Wu and Bharat Bhargava, Purdue University Digital Rights Management of Software Innovations: Policy Evaluation, Strategic Design and Implementation Taeha Kim and Alex Talalayevsky, George Mason University Representing Secure Knowledge Management with Policies and Procedures in a Network Simulator David Edelstein and Denise Edwards, U.S. Military Academy, West Point, New York A Study on the Convergence of Biometrics and Cryptographic Security Sharat S. Chikkerur, Viraj S. Chavan, and Venu Govindaraju, University at Buffalo ACIDS: Advanced Collated Intrusion Detection System Ronald C Dodge JR. and Shaun Baker, U.S. Military Academy, West Point, New York Ensuring Secure Information Management in 802.11 Networks after a Central Authority Failure Mohit Virendra and Shambhu Upadhyaya, University at Buffalo 7:30 – 9:00 Workshop Banquet Welcome and Introduction of Banquet Speaker John Thomas, Dean, School of Management, University at Buffalo Banquet Speech: The Challenges of Secure Knowledge Management Margaret (Peg) Grayson, President and CEO, V-One Corporation and Member, National Infrastructure Advisory Council END OF DAY 1 PROGRAM
THE PROGRAM DAY 2 Friday, September 24, 2004 7:30 – 8:30 Breakfast/Registration 8:30 – 9:15 Keynote Address Collaborative Secure Knowledge Management William K. McQuay, Technical Advisor, Collaborative Simulation Technology and Applications Branch, Information Systems Division, Information Directorate, AFRL, Wright Research Site 9:15 – 10:20 Plenary Talks Chair: TBD Economics, psychology, and sociology and the limitations they impose on secure knowledge management Andrew Odlyzko, ADC Professor and Assistant VP for Research; Director, Digital Technology Center, University of Minnesota Title: TBD Peter P. Chen, M.J. Foster Distinguished Chair Professor of Computer Science, Louisiana State University 10:20 – 10:45 Coffee Break 10:45 – 12:00 SESSION 3A: Trusted Computing Chair: Brajendra Panda, University of Arkansas (tentative) A Control Flow Integrity based Trust Model Akhilesh Tyagi, Iowa State University (Invited Talk) Trust Management and Theory Revision Ji Ma, University of South Australia Using Entropy to Tradeoff Privacy and Trust Yuhui Zhong and Bharat Bhargava, Purdue University SESSION 3B: Secure Content Management Chair: Kevin Kwiat, Airforce Research Laboratory Title: TBD Robert McGraw, National Security Agency (Invited Talk) Using Facets of Security within a Knowledge-based Framework to Manage Semantic Web Services Randy Howard and Larry Kerschberg, George Mason University The Interrelationship between Security and KM Karen Neville and Philip Powell, National University of Ireland – Cork, Ireland 12:00 – 1:45 Lunch 1:45 – 3:00 SESSION 4A: Security and Privacy Chair: Chris Brown, CTG and Information Systems Security Association (tentative Statistical Privacy for Privacy-Preserving Data Mining Johannes Gherke, Cornell University (Invited Talk) On Privacy and Anonymity in Knowledge Externalization Yuen-Yan Chan, The Chinese Institute of Hong Kong Trust-Based Privacy Preservation for Peer-to-peer Media Streaming Yi Lu, Weichao Wang, Dongyan Xu, and Bharat Bhargava, Purdue University SESSION 4B: Security in Document Control Systems Chair: Dipak Pravin, Xerox Corporation Topic: TBD Shriram Revankar, Xerox Research (Invited Talk) Enhanced Access Control for Collaborative Documents Jeffrey D. Campbell, University of Maryland, Baltimore Country Securing Organizational Knowledge using Automated Annotation Savitha Kadiyala, Kamesh Namudur and Venu Dasigi, Georgia State University, Wichita State University, Southern Polytechnic State University 3:00 – 3:30 Coffee Break 3:30 – 4:30 SESSION 5A: New Security Paradigms for Knowledge Management Chair: TBD Securing Information through Trust Management in Wireless Networks Mohit Virendra and Shambhu Upadhyaya, State University of New York at Buffalo PBKM: A Secure Knowledge Management Framework Shouhuai Xu and Weining Zhang, University of Texas at San Antonio Securing Knowledge Queries Using Code Striping Mark W. Bailey and Kevin Kwiat, Airforce Research Lab, Rome Research Site SESSON 5B: Theoretical Approaches to Information Assurance Chair: Dipankar Dasgupta, University of Memphis (tentative) A Multi-Disciplinary Approach for Countering Insider Threats Robert DelZoppo, Eric Brown, Matt Downey, Elizabeth Liddy, Svetlana Symonenko, Joon Park, Shuyuan Ho, Michael D’Eredita and Anand Natarajan, Syracuse Research Corporation and Syracuse University A Game-theoretic Approach to the Design of Self-Protection and Self-Healing Mechanisms in Autonomic Computing Systems Birendra Mishra and T. S. Raghu, University of California, Riverside and Arizona State University Information theoretic model for inference-resistant knowledge management in RBAC-based collaborative environment Manish Gupta and Sivakumar Chennuru, M&T Bank Corporation Buffalo, New York 4:30 – 4:45 Wrap-Up
|
Copyright 2007 © CEISARE | |