1
|
|
2
|
- Welcome to SKM 2004
- Purpose of the Workshop
- Gather like minds and cultivate a significant research problem
- Lead to some important research agenda
- Workshop logistics
- 50 submissions from North America, Europe, Asia
- 26 regular papers, 8 posters after a refereeing process by the PC<=
/li>
- 15 special presentations
- 3 keynotes + 2 dinner/lunch speeches + 4 plenary talks + 6 invited
papers from SKM experts and practitioners + 1 high-powered panel<=
/li>
- Support from NSF, AFRL, DoD/NSA and UB
- Thanks are due to the Deans of SEAS and SOM
|
3
|
- Federal/State
- Bhavani Thuraisingham, NSF
- Hun Kim, DHS
- Robert McGraw, NSA
- William K. McQuay, AFRL
- Russell W. Bessette, NYSTAR
- Industries
- Alan D. Marwick, IBM
- Shriram Revankar, Xerox
- Margaret (Peg) Grayson, V-One Corporation
- Academic
- Bharat Bhargava, Purdue
- Peter Chen, LSU
- Shiu-Kai Chin, Syracuse
- Johannes Gehrke, Cornell University
- Andrew Odlyzko, Univ. of Minnesota
- Ravi Sandhu, GMU
- Akhilesh Tyagi, Iowa State
|
4
|
- 7:30 – 8:30 Breakfast / Registration Outside ballroom 1-3<=
/li>
- 8:30 – 8:45 Welcome Address – Satish Tripathi &nbs=
p;
Ballroom 1-3
- 8:45 – 9:30 Keynote Address&=
nbsp;
- Secure Knowl=
edge
Management – Dr.
Thuraisingham Ballroom 1-3
- 9:30 – 10:15 Keynote Address=
- National Cyb=
er
Security – Progress and Road Ahead - Hun Kim &nbs=
p;
Ballroom 1-3
- 10:15 – 10:45 Coffee Break Outside Ballroom 1-3
- 10:45 – 12:00 SESSION 1A: Access Control and Rights &nbs=
p;
Ballroom 1-3
- =
SESSION 1B:Trust and Privacy =
Salon C&D
- 12:00 – 1:15 Lunch &nbs=
p;
Nightclub
- 1:15 – 2:45 SESSION 2A: Monitoring, De=
tection
and Intrusion Response &nbs=
p;
Ballroom 1-3 SESSION 2B: Security in He=
alth
Informatics &nbs=
p;
Salon C&D
- 2:45 – 3:10 Coffee Break Outside Ballroom 1-3
- 3:10 – 4:15 Plenary Talks &nbs=
p;
Ballroom 1-3
- 4:15 – 5:45 Panel Discussion=
- Women and Cyber Security: Gendered Tasks and Inequitable
Outcomes &nbs=
p;
Ballroom 1-3
- 6:15 – 7:30 Social Hour and Poster Session &nbs=
p;
Pre Assembly & Ballroom 5
- 7:30 – 9:00 Workshop Banquet Speech - The Challenges of Secure
Knowledge Management - Margaret (Peg) Grayson &nbs=
p;
Ballroom 5
|
5
|
- Prof. Satish Tripathi, the Provost of University at Buffalo, The St=
ate
University of New York
|
6
|
- Keynote Addresses
(Ballroom 1-3)
- Chair: Satish Tripathi, University at Buffalo
- Secure Knowledge Management
- Bhavani Thuraisingham, Program Director, Cyber Trust and Data and
Applications Security at the National Science Foundation
- National Cyber Security – Progress and Road Ahead
- Hun Kim, Deputy Director, Strategic Initiatives at the Department=
of
Homeland Security, National Cyber Security Division
|
7
|
- SESSION 1A: Access Control and Rights (Ballroom 1-3)
- Chair: Chris Brown, Independent Health and Information Systems Sec=
urity
Association
- A Trusted Information Sharing Project
- Shiu-Kai Chin, Professor and Director, CASE Center,
a NY State Center for Advanced Technology in Information
Technology, Syracuse University (Invited Talk)
- Using Subject and Object Specific Attributes for Access control in
Web-based Knowledge management Systems
- Gerald Stermsek*, Mark Strembeck, and Gustaf Neumann, Vienna
University of Economics, Austria
- Auditable Security Controls of Best in Class Security and Operatio=
ns
Organizations
- Gene Kim*, Tripwire Inc., Portland, Oregon
|
8
|
- SESSION 1B: Trust and Privacy &nbs=
p;
(Salon C&D)
- Chair: Nasir Memon, Polytechnic University
- Private and Trusted Collaboration
- Bharat Bhargava, Purdue University (Invited Talk)
- Trust-based Security Policies
- Henry Hexmoor*, Sandeep Bhattaram, and Seth Wilson, University of
Arkansas
- Assessing the Effect of Deceptive Data in the Web of Trust
- Yi Hu, Brajendra Panda*, and Yanjun Zuo, University of Arkansas=
li>
|
9
|
- SESSION 2A: Monitoring, Detection and Intrusion Response &nbs=
p;
(Ballroom 1-3)
- Chair: Henry Hexmoor, University of Arkansas
- A Queuing Formulation of Intrusion Detection with Active and Passi=
ve
Responses
- Wei T. Yue*, Metin Cakanyildirim, and Young U. Ryu, University of
Texas at Dallas
- Workflow Anomaly Detection in Secure Systems
- Timothy J. Smith*, MCNC Research and Development Institute
- Detecting the Misappropriation of Information through Bottleneck
Monitoring
- Terrance Goan* and<=
span
style=3D'mso-spacerun:yes'> Matthew Broadhead, Stottl=
er
Henke Associates, Inc., Seattle, Washington
- Network Log Anonymization: Application of Crypto-PAn to Cisco Netf=
lows
- Adam Slagell*, Jun Wang, and William Yurcik, University of Illino=
is at
Urbana-Champaign
|
10
|
- SESSION 2B: Security in Health Informatics &nbs=
p;
(Salon C&D)
- Co-Chairs: Raj Sharman & Peter Winkelstein, University at Buff=
alo
- Data Access Control and Measure in the Development of Web-Based He=
alth
Insurance Systems
- Zhen Jiang*, West Chester University
- A Policy-Based Security Mechanism for Distributed Heath Networks=
li>
- A. Onabajo*, C. Obry and J.H. Jahnke, University of Victoria
- Securing Clinical Knowledge: Balancing Accessibility, Security, and
Privacy in Dental Education
- Daniel W. Emmer and Ebrahim Randeree*, State University of New Yo=
rk at
Buffalo
- Securing Pervasive Networks using Biometrics
- V. Chavan, S. Chikkerrur*, S. Tulyakov and V. Govindaraju, State
University of New York at Buffalo
|
11
|
- Plenary Talks (B=
allroom
1-3)
- Chair: Larry Kerschberg, George Mason University
- Cyber-Identity, Authority and Trust in an Uncertain World
- Ravi Sandhu, Department of Information and Software Engineering,
George Mason University, Co-Founder of Securivacy (formerly,
SingleSignOn.net)
- Patterns of Knowledge Management in Secure Environments
- Alan D. Marwick, Senior Manager, Knowledge Management, IBM T.J. W=
atson
Research Center
|
12
|
- Panel Discussion
&n=
bsp;
(Ballroom 1-3)
- Moderator – Sharmistha Bagchi-Sen, University at Buffalo
- Women and Cyber Security – Gendered Tasks and Inequitable Out=
comes
- Panelists:
- Margaret (Peg) Grayson
- President and CEO, V-One Corporation and Member, National
Infrastructure Advisory Council
- Harry G. Meyer
- Partner, Hodgson Russ LLP and Board Member, FBI Infragard Program=
- Susan Patrick
- Director of Education Technology, U.S. Department of Education
- Bhavani Thuraisingham
- Program Director, Cyber Trust and Data and Applications Security =
at
the National Science Foundation
|
13
|
- Workshop Banquet &nbs=
p;
&nbs=
p;
(Ballroom 5)
- Chair: John Thomas, Dean, School of Management, University at Buff=
alo
- Banquet Speech: The Challenges of Secure Knowledge Management
- Margaret (Peg) Grayson, President and CEO, V-One Corporation and
Member, National Infrastructure Advisory Council
|
14
|
|
15
|
|
16
|
- A mandate for the participants – develop a research agenda in
secure knowledge management
- What do you think are the top five most important problems that ne=
ed
resolution in secure knowledge management
- What do you think are the top five most urgent problems that need
resolution in SKM
- E-mail to skm-2004@cse.buffalo.edu
|
17
|
- Call for Papers
- Special Issue on Secure Knowledge Management
- Guest Editors: H. R. Rao (SOM) and S. Upadhyaya (CSE) SUNY at Buffa=
lo
- High quality manuscr=
ipts
are sought for a special issue of IEEE Transactions on SMC (Part A)=
. The
purpose of this special issue is to bring together the works of
researchers, designers, and implementers of secure knowledge manage=
ment
systems. In addition to traditional submissions, we specially welco=
me
papers that promote methodologies of systems, man, and cybernetics.=
We
encourage papers that describe industrial projects, prototype syste=
ms,
exploratory or emerging applications.
|
18
|
- 7:30 – 8:30 Breakfast / Registration Outside Ballroom 1-3=
- 8:30 – 9:15 Keynote Address - Collaborative Secu=
re
Knowledge Management
- – William K. McQuay &=
nbsp;
Ballroom 1-3
- 9:15 – 10:20 Plenary Talks &nbs=
p;
Ballroom 1-3
- 10:20 – 10:45 Coffee Break Outside Ballroom 1-3
- 10:45 – 12:00 SESSION 3A:&nb=
sp;
Trusted Computing &nbs=
p;
Ballroom 1-3 SESSION 3B:&n=
bsp;
Secure Content Management &nbs=
p;
Salon C&D
- 12:00 – 1:45 Luncheon Talk - Securing Knowledge in an
Insecure World - Russ=
ell
Bessette &nbs=
p;
Ballroom 4
- 1:45 – 3:00 SESSION 4A: Security and Privacy &nbs=
p;
Ballroom 1-3
- SESSION 4B: Security in Document Control Systems &=
nbsp;
Salon C&D
- 3:00 – 3:30 Coffee Break Outside Ballroom 1-3
- 3:30 – 4:30 SESSION 5A: New Security Paradigms for Knowledge
Management &nbs=
p;
Ballroom 1-3
- SESSON 5B: Theoretical Approaches to Information Assurance =
Salon C&D
- 4:30 – 4:45 Wrap-Up &nbs=
p;
Ballroom 1-3
|
19
|
- Keynote Address <=
span
style=3D'mso-spacerun:yes'> (B=
allroom
1-3)
- Chair: Nikolaos Bourbakis, Wright State University
- Collaborative Secure Knowledge Management
- William K. McQuay, Technical Advisor, Collaborative Simulation
Technology and Applications Branch, Information Systems Division,
Information Directorate, AFRL, Wright Research Site
|
20
|
- Plenary Talks &nbs=
p;
(Ballroom 1-3)
- Chair: Dipak Pravin, Xerox Corporation
- Economics, Psychology, and Sociology and the Limitations they Impo=
se on
Secure Knowledge Management
- Andrew Odlyzko, ADC Professor and Assistant VP for Research; Dire=
ctor,
Digital Technology Center, University of Minnesota
- Faster Differentiation of Terrorists and Malicious Transactions fr=
om
Good People and Transactions
- Peter P. Chen, M.J. Foster Distinguished Chair Professor of Compu=
ter
Science, Louisiana State University
|
21
|
- SESSION 3A: Trusted Computing <=
span
style=3D'mso-spacerun:yes'>
(Ballroom 1-3)
- Chair: Brajendra Panda, University of Arkansas
- A Control Flow Integrity based Trust Model
- Akhilesh Tyagi, Iowa State University (Invited Talk)
- Trust Management and Theory Revision
- Ji Ma*, University of South Australia
- Using Entropy to Tradeoff Privacy and Trust
- Yuhui Zhong and Bharat Bhargava*, Purdue University
|
22
|
- SESSION 3B: Secure Content Management &nbs=
p;
(Salon C&D)
- Chair: Kevin Kwiat, Air Force Research Laboratory
- Securing Content in
DoD’s Global Information Grid
- Robert McGraw, National Security Agency (Invited Talk)
- Using Facets of Security within a Knowledge-based Framework to Man=
age
Semantic Web Services
- Randy Howard and Larry Kerschberg*, George Mason University
- The Interrelationship between Security and KM
- Karen Neville* and Philip Powell, National University of Ireland
– Cork, Ireland
|
23
|
- Luncheon Speech &nbs=
p;
&nbs=
p;
(Ballroom 4)
- Chair: Mark Karwan, Dean, School of Engineering and Applied Scienc=
es,
University at Buffalo
- Securing Knowledge in an Insecure World
- Russell Bessette, Executive Director, New York State Office of Sci=
ence,
Technology and Academic Research (NYSTAR) and Member, Homeland Sec=
urity
Science and Technology Advisory Committee (HSSTAC)
|
24
|
- SESSION 4A: Security and Privacy <=
span
style=3D'mso-spacerun:yes'> (B=
allroom
1-3)
- Chair: John McDermott, Naval Research Laboratory
- Statistical Privacy for Privacy-Preserving Data Mining
- Johannes Gehrke, Cornell University (Invited Talk)
- On Privacy and Anonymity in Knowledge Externalization
- Yuen-Yan Chan*, The Chineese Institute of Hong Kong
- Trust-Based Privacy Preservation for Peer-to-peer Media Streaming<=
/li>
- Yi Lu, Weichao Wang, Dongyan Xu, and Bharat Bhargava*, Purdue
University
|
25
|
- SESSION 4B: Security in Document Control Systems &nbs=
p;
(Salon C&D)
- Chair: Robert DelZoppo, Syracuse Research Corporation
- Adaptive Smart Documents
- Shriram Revankar, Xerox Research (Invited Talk)
- Enhanced Access Control for Collaborative Documents
- Jeffrey D. Campbell*, University of Maryland, Baltimore Country=
li>
- Securing Organizational Knowledge using Automated Annotation
- Savitha Kadiyala, Kamesh Namuduri* and Venu Dasigi, Georgia State
University, Wichita State University, Southern Polytechnic State
University
|
26
|
- SESSION 5A: New Security Paradigms for Knowledge Management
&nbs=
p;
(Ballroom 1-3)
- Chair: Al F. Salam, University of North Carolina, Greensboro
- Securing Information through Trust Management in Wireless Networks=
- Mohit Virendra* and Shambhu Upadhyaya, State University of New Yo=
rk at
Buffalo
- PBKM: A Secure Knowledge Management Framework
- Shouhuai Xu* and Weining Zhang, University of Texas at San Antoni=
o
- Securing Knowledge Queries Using Code Striping
- Mark W. Bailey and Kevin Kwiat*, Air Force Research Lab, Rome Res=
earch
Site
|
27
|
- SESSON 5B: Theoretical Approaches to Information Assurance (Salon
C&D)
- Chair: Raghu Santanam, Arizona State University
- A Multi-Disciplinary Approach for Countering Insider Threats
- Robert DelZoppo*, Eric Brown, Matt Downey, Elizabeth Liddy, Svetl=
ana
Symonenko, Joon Park, Shuyuan Ho, Michael D’Eredita and Anand
Natarajan, Syracuse Research Corporation and Syracuse University=
li>
- A Game-theoretic Approach to the Design of Self-Protection and
Self-Healing Mechanisms in Autonomic Computing Systems
- Birendra Mishra and T. S. Raghu*, University of California, River=
side
and Arizona State University
- Information Theoretic Model for Inference-resistant Knowledge
Management in RBAC based Collaborative Environment
- Manish Gupta and Sivakumar Chennuru*, M&T Bank Corporation
Buffalo, New York
|
28
|
- The workshop will be deciding on a best paper award shortly based o=
n the
recommendations of the session chairs and the referees.
- Photographs of the workshop will be displayed on the workshop websi=
te
shortly.
- Thanks to all the participants especially to those who came from the
farthest parts of the globe and all the PC committee members, some =
of
those who could not be with us.
|