Ceisare
Center of Excellence in Information Systems Assurance Research and Education

   
Home | Up | Program Committee | Presentation Slides | Call for Papers | Final Paper Format | Invited Speakers | Hotel

Schedule

Marriott Buffalo-Niagara
1340 Millersport Highway
Amherst, NY 14221 USA
Phone: 1 716-689-6900
Fax: 1 716-689-0483

Website: http://marriott.com/property/propertyPage/BUFNY

For accommodation, call Marriott Buffalo-Niagara directly and mention “Workshop on Secure Knowledge Management” to get the Workshop rate of $89 per night, single or double 

REGISTRATION

Workshop Website: http://www.cse.buffalo.edu/caeiae/skm2004/

Registration Website: http://www.ubevents.org/regengine/index_event.php?eventid=72

THE PROGRAM       DAY 1

Thursday, September 23, 2004 

7:30 – 8:30      Breakfast/Registration 

8:30 – 8:45      Welcome Address

Satish Tripathi, Provost, University at Buffalo, State University of New York 

8:45 – 9:30      Keynote Address

Secure Knowledge Management

Bhavani Thuraisingham, Program Director, Cyber Trust and Data and Applications Security at the National Science Foundation 

9:30 – 10:15    Keynote Address

National Cyber Security – Progress and Road Ahead

Hun Kim, Director, Strategic Initiatives at the Department of Homeland Security, National Cyber Security Division 

10:15 – 10:45  Coffee Break 

10:45 – 12:00  SESSION 1A: Access Control and Rights

                        Chair: John McDermott, Naval Research Laboratory 

                                                Towards an Interdisciplinary Understanding of Trust and Rights

Shiu-Kai Chin, Professor and Director, CASE Center,
a NY State Center for Advanced Technology in Information Technology, Syracuse University (Invited Talk) 

Using Subject and Object Specific Attributes for Access control in Web-based Knowledge management Systems

Gerald Stermsek, Mark Strembeck, and Gustaf Neumann, Vienna University of Economics, Austria 

Providing Technical Controls to Secure Federal Information Systems

Stephanie Wettstein, TNT Communication, Portland, Oregon           

                        SESSION 1B: Trust and Privacy

                        Chair: Mukesh Singhal, University of Kentucky (tentative) 

Private and Trusted Collaboration

Bharat Bhargava, Purdue University (Invited Talk) 

Trust-based Security Policies

Henry Hexmoor, Sandeep Bhattaram, and Seth Wilson, University of Arkansas 

Assessing the Effect of Deceptive Data in the Web of Trust

Yi Hu, Brajendra Panda, and Yanjun Zuo, University of Arkansas 

12:00 – 1:15    Lunch 

1:15 – 2:45      SESSION 2A: Monitoring, Detection and Intrusion Response

                        Chair: Olivia Sheng, University of Utah 

A Queuing Formulation of Intrusion Detection with Active and Passive Responses

Wei T. Yue, Metin Cakanyildirim, and Young U. Ryu, University of Texas at Dallas 

Workflow Anomaly Detection in Secure Systems

Timothy J. Smith, MCNC Research and Development Institute 

Detecting the Misappropriation of Information through Bottleneck Monitoring

Terrance Goan  and  Matthew Broadhead, Stottler Henke Associates, Inc., Seattle, Washington 

Network Log Anonymization: Application of Crypto-PAn to Cisco Netflows

Adam Slagell, Jun Wang, and William Yurcik, University of Illinois at Urbana-Champaign                                   

                        SESSION 2B: Security in Health Informatics

                        Co-Chairs: Raj Sharman & Peter Winkelstein, University at Buffalo 

Data Access Control and Measure in the Development of Web-Based Health Insurance Systems

Zhen Jiang, West Chester University 

A Policy-Based Security Mechanism for Distributed Heath Networks

A. Onabajo, C. Obry and J.H. Jahnke, University of Victoria 

Securing Clinical Knowledge: Balancing Accessibility, Security, and Privacy in Dental Education

Daniel W. Emmer and Ebrahim Randeree, State University of New York at Buffalo 

Securing Pervasive Networks using Biometrics

V. Chavan, S. Chikkerrur, S. Tulyakov and V. Govindaraju, State University of New York at Buffalo 

2:45 – 3:10      Coffee Break 

3:10 – 4:15      Plenary Talks

                        Chair: TBD 

                        Cyber-Identity, Authority and Trust in an Uncertain World

Ravi Sandhu, Department of Information and Software Engineering, George Mason University, Co-Founder of Securivacy (formerly, SingleSignOn.net)

                        Patterns of Knowledge Management in Secure Environments

Alan D. Marwick, Senior Manager, Knowledge Management, IBM T.J. Watson Research Center 

4:15 – 5:45      Panel Discussion

Moderator – Sharmistha Bagchi-Sen, University at Buffalo 

Women and Cyber Security – Gendered Tasks and Inequitable Outcomes

                        Panelists:

Margaret (Peg) Grayson

President and CEO, V-One Corporation and Member, National Infrastructure Advisory Council

                        Susan Patrick

Director of Education Technology, U.S. Department of Education

Bhavani Thuraisingham

Program Director, Cyber Trust and Data and Applications Security at the National Science Foundation  

6:15 – 7:30      Social Hour and Poster Session

                        Posters

                        Chair: TBD

                                                CDMS: Cyber Defense Management System

                                                Dipankar Dasgupta, University of Memphis

                                                Securing network traffic and intrusion detection data

Benjamin D. Uphoff and Johnny S.K. Wong, Los Alamos National Laboratory and Iowa State University

                                                Creating Knowledge at the Cost of Privacy: A Case Study

Karen Neville, Philip Powell, and Kevin O’Sullivan, N     National University of Ireland – Cork, Ireland 

A Risk-aware Approach to Knowledge Management of Security Choices

                                                Scott Campbell and James Kiper, Miami University, Ohio 

Location Privacy in Geographical Routing for Mobile Ad Hoc Networks

                                                Weichao Wang and Bharat Bhargava, Purdue Universit 

Improving Security in Ad Hoc Networks through Integrated Architecture

                                                Xiaoxin Wu and Bharat Bhargava, Purdue University 

Digital Rights Management of Software Innovations: Policy Evaluation, Strategic Design and Implementation

Taeha Kim and Alex Talalayevsky, George Mason University 

Representing Secure Knowledge Management with Policies and Procedures in a Network Simulator

David Edelstein and Denise Edwards, U.S. Military Academy, West Point, New York 

A Study on the Convergence of Biometrics and Cryptographic Security

Sharat S. Chikkerur, Viraj S. Chavan, and Venu Govindaraju, University at Buffalo 

                                                ACIDS: Advanced Collated Intrusion Detection System

Ronald C Dodge JR. and Shaun Baker, U.S. Military Academy, West Point, New York 

Ensuring Secure Information Management in 802.11 Networks after a Central Authority Failure

                                                Mohit Virendra and Shambhu Upadhyaya, University at Buffalo 

7:30 – 9:00      Workshop Banquet 

                        Welcome and Introduction of Banquet Speaker

                        John Thomas, Dean, School of Management, University at Buffalo

Banquet Speech: The Challenges of Secure Knowledge Management

Margaret (Peg) Grayson, President and CEO, V-One Corporation and Member, National Infrastructure Advisory Council

END OF DAY 1 PROGRAM

 

THE PROGRAM       DAY 2

Friday, September 24, 2004 

7:30 – 8:30      Breakfast/Registration 

8:30 – 9:15      Keynote Address

Collaborative Secure Knowledge Management

William K. McQuay, Technical Advisor, Collaborative Simulation Technology and Applications Branch, Information Systems Division, Information Directorate, AFRL, Wright Research Site 

9:15 – 10:20    Plenary Talks

                        Chair: TBD

Economics, psychology, and sociology and the limitations they impose on secure knowledge management

Andrew Odlyzko, ADC Professor and Assistant VP for Research; Director, Digital Technology Center, University of Minnesota

                        Title: TBD

Peter P. Chen, M.J. Foster Distinguished Chair Professor of Computer Science, Louisiana State University

                        10:20 – 10:45  Coffee Break

10:45 – 12:00  SESSION 3A: Trusted Computing

                        Chair: Brajendra Panda, University of Arkansas (tentative) 

                                                A Control Flow Integrity based Trust Model

Akhilesh Tyagi, Iowa State University (Invited Talk)

Trust Management and Theory Revision

Ji Ma, University of South Australia

Using Entropy to Tradeoff Privacy and Trust

Yuhui Zhong and Bharat Bhargava, Purdue University 

                        SESSION 3B: Secure Content Management

                        Chair: Kevin Kwiat, Airforce Research Laboratory 

                                                Title: TBD

Robert McGraw, National Security Agency (Invited Talk)

Using Facets of Security within a Knowledge-based Framework to Manage Semantic Web Services

Randy Howard and Larry Kerschberg, George Mason University

The Interrelationship between Security and KM

Karen Neville and Philip Powell, National University of Ireland – Cork, Ireland

12:00 – 1:45    Lunch 

1:45 – 3:00      SESSION 4A: Security and Privacy

Chair: Chris Brown, CTG and Information Systems Security Association (tentative

Statistical Privacy for Privacy-Preserving Data Mining

Johannes Gherke, Cornell University (Invited Talk)

On Privacy and Anonymity in Knowledge Externalization

Yuen-Yan Chan, The Chinese Institute of Hong Kong

Trust-Based Privacy Preservation for Peer-to-peer Media Streaming

Yi Lu, Weichao Wang, Dongyan Xu, and  Bharat Bhargava, Purdue University 

                        SESSION 4B: Security in Document Control Systems

                        Chair: Dipak Pravin, Xerox Corporation 

                                                Topic: TBD

Shriram Revankar, Xerox Research (Invited Talk) 

Enhanced Access Control for Collaborative Documents

Jeffrey D. Campbell, University of Maryland, Baltimore Country 

Securing Organizational Knowledge using Automated Annotation

Savitha Kadiyala, Kamesh Namudur and Venu Dasigi, Georgia State University, Wichita State University, Southern Polytechnic State University 

3:00 – 3:30      Coffee Break 

3:30 – 4:30      SESSION 5A: New Security Paradigms for Knowledge Management

                        Chair: TBD

Securing Information through Trust Management in Wireless Networks

Mohit Virendra and Shambhu Upadhyaya, State University of New York at Buffalo

PBKM: A Secure Knowledge Management Framework

Shouhuai Xu and Weining Zhang, University of Texas at San Antonio 

Securing Knowledge Queries Using Code Striping

Mark W. Bailey and Kevin Kwiat, Airforce Research Lab, Rome Research Site

SESSON 5B:   Theoretical Approaches to Information Assurance

Chair: Dipankar Dasgupta, University of Memphis (tentative)

A Multi-Disciplinary Approach for Countering Insider Threats

Robert DelZoppo, Eric Brown, Matt Downey, Elizabeth Liddy, Svetlana Symonenko, Joon Park, Shuyuan Ho, Michael D’Eredita and Anand Natarajan, Syracuse Research Corporation and Syracuse University 

                        A Game-theoretic Approach to the Design of Self-Protection and Self-Healing Mechanisms in Autonomic Computing Systems

                        Birendra Mishra and T. S. Raghu, University of California, Riverside and Arizona State University

                        Information theoretic model for inference-resistant knowledge management in RBAC-based collaborative environment

Manish Gupta and Sivakumar Chennuru, M&T Bank Corporation Buffalo, New York 

4:30 – 4:45      Wrap-Up

 

 
 

Copyright 2007 © CEISARE | Home | Site Map | Contact Info | Privacy