5th International Conference on Information Systems Security

(ICISS 2009)

 

 

Programme Schedule

 

 

December 14, 2009

 

8:30 – 9:30

Registration

9:30 – 11:00

Tutorial 1

11:00 – 11:30

Tea/Coffee Break

11:30 – 13:00

Tutorial 1 (continued)

13:00 – 14:00

Lunch Break

14:00 – 15:30

Tutorial 2

15:30 – 16:00

Tea/Coffee Break

16:00 – 17:30

Tutorial 2 (continued)

 

 

 

December 15, 2009

 

8:30 – 9:30

Registration

9:30 – 11:00

Tutorial 3

11:00 – 11:30

Tea/Coffee Break

11:30 – 13:00

Tutorial 3 (continued)

13:00 – 14:00

Lunch Break

14:00 – 15:30

Tutorial 4

15:30 – 16:00

Tea/Coffee Break

16:00 – 17:30

Tutorial 4 (continued)

 

 

 

 

 

 


 

 

December 16, 2008

 

8:30 – 9:30

Registration

9:30 – 10:00

Inauguration

10:00 – 11:00

Keynote Talk 1

Title: A Survey of Voice Over IP Security Research

Speaker: Angelos D. Keromytis, Symantec Research Labs Europe, France

11:00 – 11:30

Tea/Coffee Break

11:30 – 13:00

Technical Session 1 :: Authentication

Matt Smart and Eike Ritter. Remote electronic voting with revocable anonymity.

Massimiliano Masi, Rosario Pugliese and Francesco Tiezzi. On secure implementation of an IHE XUA-based protocol for authenticating healthcare professionals.

Bing Liang, Yingjiu Li, Changshe Ma, Tieyan Li and Robert Deng. On the untraceability of anonymous RFID authentication protocol with constant key-lookup.

13:00 – 14:00

Lunch Break

14:00 – 15:00

Keynote Talk 2

Title: Security for a Smarter Planet

Speaker: Nataraj Nagaratnam, Distinguished Engineer and CTO, IBM India Software Lab, New Delhi

15:00 – 15:30

Tea/Coffee Break

15:30 – 17:00

Technical Session 2 :: Verification and Cryptography

Zhiyao Liang and Rakesh M. Verma. Correcting and improving the NP proof for cryptographic protocol insecurity.

Padmalochan Bera, Soumya K. Ghosh and Pallab Dasgupta. Formal verification of security policy implementations in enterprise networks.

Cuauhtemoc Mancillas-L—pez, Debrup Chakraborty and Francisco Rodr’guez-Henr’quez. On some weaknesses in the disc encryption schemes EME and EME2.

 

17:00 – 18:00

 

 

Industry Session

 


 

 

December 17, 2008

 

10:00 – 11:00

Keynote Talk 3

Title: The WOMBAT Attack Attribution method: some results

Speaker: Marc Dacier, Director, Symantec Research Labs Europe, France

11:00 – 11:30

Tea/Coffee Break

11:30 – 13:00

Technical Session 3 :: Systems Security

Michael K. Reiter, Vyas Sekar, Chad Spensky and Zhenghao Zhang. Making peer-assisted content distribution robust to collusion using bandwidth puzzles.

Zhen Zhang, K. H. (Kane) Kim, Myeong-Ho Kang, Tianran Zhou, Byung-Ho Chung, Shin-Hyo Kim and Seok-Joon Lee. An e-cash based implementation model for facilitating anonymous purchasing of information products.

Ping Chen, Hai Xiao, Xiaobin Shen, Xinchun Yin, Bing Mao and Li Xie. DROP: detecting return-oriented programming malicious code.

13:00 – 14:00

Lunch Break

14:00 – 15:30

Technical Session 4 :: Behavior Analysis

Lorenzo Martignoni, Roberto Paleari and Danilo Bruschi. A framework for behavior-based malware analysis in the cloud.

Vanessa Frias-Martinez, Salvatore Stolfo and Angelos D. Keromytis. BARTER: behavior profile exchange for behavior-based admission and access control in MANETs.

Jonathan White and Brajendra Panda. Automatic identification of critical data items in a database to mitigate the effects of malicious insiders.

15:30 – 16:00

Tea/Coffee Break

16:00 – 17:30

Technical Session 5 :: Database Security

Gaurav Gupta and Josef Pieprzyk. Database relation watermarking resilient against secondary watermarking attacks.

Ge Fu, Hong Zhu, Yucai Feng and Yingjiu Li. A robust damage assessment model for corrupted database systems.

Sukriti Bhattacharya and Agostino Cortesi. A generic distortion free watermarking technique for relational databases.

19:00 onwards

Cultural Function + Banquet

 

 


 

 

December 18, 2008

 

10:00 – 11:00

Keynote Talk 4

Title: Biometrics and Security

Speaker: Venu Govindaraju, Director, Center for Unified Bioinformatics and Sensors, University of Buffalo, SUNY

11:00 – 11:30

Tea/Coffee Break

11:30 – 12:30

Technical Session 6 :: Cryptography

Michael Adjedj, Julien Bringer, HervŽ Chabanne and Bruno Kindarji. Biometric identification over encrypted data made feasible.

Shri Kant Ojha, Naveen Kumar, Kritika Jain and Sangeeta. TWIS – a lightweight block cipher.

12:30 – 13:30

Technical Session 7 :: Short Papers

Indranil Saha and Debapriyay Mukhopadhyay. Quantitative analysis of a probabilistic non-repudiation protocol through model checking (short paper).

Jeff Zarnett, Patrick Lam and Mahesh Tripunitara. Method-specific Java access control via RMI proxy objects using annotations (short paper).

Nagaraja Kaushik Gampa, Rohit Ashok Khot and Kannan Srinathan. Let only the right one in: privacy management scheme for social network (short paper).

Ravi Mukkamala, Vishnu Kamisetty and Pawankumar Yedugani. Detecting and resolving misconfigurations in role-based access control (short paper).

13:30 – 13:45

Closing Session

13:30 – 14:30

Lunch Break