MONDAY, SEPTEMBER 23
|
|
7:00 - 9:00
|
Reception and dinner
|
|
TUESDAY, SEPTEMBER 24
|
|
7:00 - 8:30
|
BREAKFAST
|
8:45 - 9:15
|
Welcome from general chairs and organizational announcements
|
|
SESSION 1. INTRUSION DETECTION AND RESPONSE.
R. Sekar, Session Chair
|
9:15 -10:15
|
An experimental system for malicious email tracking
Manasi Bhattacharyya, Matthew G. Schultz, Eleazar Eskin, Shlomo Hershkop, Salvatore J. Stolfo
|
| |
10:15 - 10:30
|
Break
|
| |
10:30 - 11:30
|
Predators: good will codes combat against computer viruses
Hiroshi Toyoizumi and Atsushi Kara
|
11:30 - 12:30
|
An empirical analysis of NATE- Network Analysis of Anomalous Traffic Events
Carol Taylor and Jim Alves-Foss
|
| |
12:30
|
Lunch
|
| |
|
SESSION 2. LARGE SYSTEMS.
Mary Ellen Zurko, Session Chair
|
2:00- 3:00
|
Small worlds in security systems: an analysis of the PGP certificate graph
Srdjan Capkun, Levente Buttyan, Jean-Pierre Hubaux
|
| |
3:00 - 3:15
|
Break
|
| |
3:15 - 4:15
|
Breaking the barriers: high performance security for high performance computing
Kay Connelly and Andrew A. Chien
|
4:15- 5:15
|
From privacy promises to privacy management--a new approach for enforcing privacy throughout an enterprise
Paul Ashley, Calvin Powers, Matthias Schunter
|
| |
7:00 - 8:30
|
Dinner
|
|
WEDNESDAY, SEPTEMBER 25
|
|
7:00-8:30
|
Breakfast
|
| |
9:00 - 9:15
|
Opening remarks. General Chairs
|
|
SESSION 3. MOBILE CODE.
Wenke Lee, Session Chair
|
9:15 - 10:15
|
Anomaly intrusion detection in dynamic execution environments
Hajime Inoue and Stephanie Forrest
|
| |
10:15 - 10:30
|
Break
|
| |
10:30 -11:30
|
Empowering mobile code using expressive security policies
V. N. Venkatakrishnan, Ram Peri, R. Sekar
|
11:30- 12:30
|
The source is the proof
Vivek Haldar, Christian H. Stork, Michael Franz
|
| |
12:30
|
Lunch
|
|
SESSION 4. USABILITY.
Angela Sasse, Session Chair
|
2:00 - 3:00
|
An approach to usable security based on event monitoring and visualization
Paul Dourish and David Redmiles
|
3: 00- 4: 00
|
Moving from the design of usable security technologies to the design of useful secure applications
Diana Smetters and Beki Grinter
|
| |
4:00- 4:15
|
Break
|
|
SESSION 5. PANEL DISCUSSION.
Steve Greenwald, Panel Chair
|
4:15 - 5:45
|
Assurance in Life/Nation Critical Endeavors
Panelists: Steven J. Greenwald, J. Michael Williams, Carla Marceau, Bob Blakley
|
| |
7:00 - 8:30
|
Dinner
|
THURSDAY, SEPTEMBER 26
|
7:00 - 8:30
|
Breakfast
|
| |
8:30 - 8:45
|
Opening remarks. General Chairs
|
|
SESSION 6. SECURING INFORMATION.
Bob Blakley, Session Chair
|
8:45 - 9:45
|
Capacity is the wrong paradigm
Ira S. Moskowitz, LiWu Chang, Richard Newman
|
| |
9:45 - 10:00
|
break
|
| |
10:00 - 11:00
|
Towards achieving acceptable security in secure multi-party computation
Wenliang Du
|
11:00 - 12:00
|
Guarding the next Internet frontier: countering denial of information attacks
Mustaque Ahamad, Wenke Lee, Ling Liu, Leo Mark, Edward Omicienski, Calton Pu, Andre dos Santos
|
| |
12:00 - 12:30
|
Wrap-up and business meeting
|
| |
12:30 - 2:00
|
Lunch
|