New Security Paradigms Workshop 2002

September 23rd - 26th, 2002

Founders Inn
Virginia Beach, Virginia
USA

Program

MONDAY, SEPTEMBER 23

7:00 - 9:00 Reception and dinner

TUESDAY, SEPTEMBER 24

7:00 - 8:30 BREAKFAST
8:45 - 9:15 Welcome from general chairs and organizational announcements

SESSION 1. INTRUSION DETECTION AND RESPONSE.
R. Sekar, Session Chair
9:15 -10:15 An experimental system for malicious email tracking
Manasi Bhattacharyya, Matthew G. Schultz, Eleazar Eskin, Shlomo Hershkop, Salvatore J. Stolfo

10:15 - 10:30 Break

10:30 - 11:30 Predators: good will codes combat against computer viruses
Hiroshi Toyoizumi and Atsushi Kara
11:30 - 12:30 An empirical analysis of NATE- Network Analysis of Anomalous Traffic Events
Carol Taylor and Jim Alves-Foss

12:30 Lunch

SESSION 2. LARGE SYSTEMS.
Mary Ellen Zurko, Session Chair
2:00- 3:00 Small worlds in security systems: an analysis of the PGP certificate graph
Srdjan Capkun, Levente Buttyan, Jean-Pierre Hubaux

3:00 - 3:15 Break

3:15 - 4:15 Breaking the barriers: high performance security for high performance computing
Kay Connelly and Andrew A. Chien
4:15- 5:15 From privacy promises to privacy management--a new approach for enforcing privacy throughout an enterprise
Paul Ashley, Calvin Powers, Matthias Schunter

7:00 - 8:30 Dinner

WEDNESDAY, SEPTEMBER 25

7:00-8:30 Breakfast

9:00 - 9:15 Opening remarks. General Chairs

SESSION 3. MOBILE CODE.
Wenke Lee, Session Chair
9:15 - 10:15 Anomaly intrusion detection in dynamic execution environments
Hajime Inoue and Stephanie Forrest

10:15 - 10:30 Break

10:30 -11:30 Empowering mobile code using expressive security policies
V. N. Venkatakrishnan, Ram Peri, R. Sekar
11:30- 12:30 The source is the proof
Vivek Haldar, Christian H. Stork, Michael Franz

12:30 Lunch

SESSION 4. USABILITY.
Angela Sasse, Session Chair
2:00 - 3:00 An approach to usable security based on event monitoring and visualization
Paul Dourish and David Redmiles
3: 00- 4: 00 Moving from the design of usable security technologies to the design of useful secure applications
Diana Smetters and Beki Grinter

4:00- 4:15 Break

SESSION 5. PANEL DISCUSSION.
Steve Greenwald, Panel Chair
4:15 - 5:45 Assurance in Life/Nation Critical Endeavors
Panelists: Steven J. Greenwald, J. Michael Williams, Carla Marceau, Bob Blakley

7:00 - 8:30 Dinner

THURSDAY, SEPTEMBER 26
7:00 - 8:30 Breakfast

8:30 - 8:45 Opening remarks. General Chairs

SESSION 6. SECURING INFORMATION.
Bob Blakley, Session Chair
8:45 - 9:45 Capacity is the wrong paradigm
Ira S. Moskowitz, LiWu Chang, Richard Newman

9:45 - 10:00 break

10:00 - 11:00 Towards achieving acceptable security in secure multi-party computation
Wenliang Du
11:00 - 12:00 Guarding the next Internet frontier: countering denial of information attacks
Mustaque Ahamad, Wenke Lee, Ling Liu, Leo Mark, Edward Omicienski, Calton Pu, Andre dos Santos

12:00 - 12:30 Wrap-up and business meeting

12:30 - 2:00 Lunch

ACM
An  ACM / SIGSAC Conference
CISC/JMU
Proceedings Sponsored by the
Commonwealth Information Security Center
James Madison University
 
SDSC
Web Site Courtesy of the San Diego Supercomputer Center