5th
International Conference on Information Systems Security
(ICISS 2009)
Programme Schedule
8:30 – 9:30 |
Registration |
9:30 – 11:00 |
Tutorial 1 |
11:00 – 11:30 |
Tea/Coffee Break |
11:30 – 13:00 |
Tutorial 1 (continued) |
13:00 – 14:00 |
Lunch Break |
14:00 – 15:30 |
Tutorial 2 |
15:30 – 16:00 |
Tea/Coffee Break |
16:00 – 17:30 |
Tutorial 2 (continued) |
8:30 – 9:30 |
Registration |
9:30 – 11:00 |
Tutorial 3 |
11:00 – 11:30 |
Tea/Coffee Break |
11:30 – 13:00 |
Tutorial 3 (continued) |
13:00 – 14:00 |
Lunch Break |
14:00 – 15:30 |
Tutorial 4 |
15:30 – 16:00 |
Tea/Coffee Break |
16:00 – 17:30 |
Tutorial 4 (continued) |
8:30 – 9:30 |
Registration |
9:30 – 10:00 |
Inauguration |
10:00 – 11:00 |
Keynote Talk 1 Title: A Survey of Voice Over IP Security Research Speaker: Angelos D. Keromytis, Symantec
Research Labs Europe, France |
11:00 – 11:30 |
Tea/Coffee Break |
11:30 – 13:00 |
Technical Session 1 :: Authentication Matt Smart and Eike Ritter. Remote electronic voting with revocable
anonymity. Massimiliano Masi, Rosario
Pugliese and Francesco Tiezzi.
On secure implementation of an IHE
XUA-based protocol for authenticating healthcare professionals. Bing Liang, Yingjiu Li, Changshe Ma, Tieyan Li and Robert Deng. On the untraceability of anonymous RFID
authentication protocol with constant key-lookup. |
13:00 – 14:00 |
Lunch Break |
14:00 – 15:00 |
Keynote Talk 2 Title: Security for a Smarter Planet Speaker: Nataraj Nagaratnam, Distinguished Engineer and CTO, IBM
India Software Lab, New Delhi |
15:00 – 15:30 |
Tea/Coffee Break |
15:30 – 17:00 |
Technical Session 2 :: Verification and Cryptography Zhiyao Liang and Rakesh
M. Verma. Correcting and improving the
NP proof for cryptographic protocol insecurity. Padmalochan Bera, Soumya K. Ghosh and Pallab Dasgupta. Formal verification of security policy implementations in enterprise
networks. Cuauhtemoc Mancillas-L—pez,
Debrup Chakraborty and
Francisco Rodr’guez-Henr’quez. On some weaknesses in the disc encryption schemes EME and EME2. |
17:00 – 18:00 |
Industry Session |
December 17, 2008
10:00 – 11:00 |
Keynote Talk 3 Title: The WOMBAT Attack Attribution method: some
results Speaker: Marc Dacier,
Director, Symantec Research Labs Europe, France |
11:00 – 11:30 |
Tea/Coffee Break |
11:30 – 13:00 |
Technical Session 3 :: Systems Security Michael K. Reiter, Vyas Sekar, Chad Spensky and Zhenghao Zhang. Making
peer-assisted content distribution robust to collusion using bandwidth
puzzles. Zhen Zhang, K. H. (Kane) Kim, Myeong-Ho
Kang, Tianran Zhou, Byung-Ho
Chung, Shin-Hyo Kim and Seok-Joon
Lee. An e-cash based implementation
model for facilitating anonymous purchasing of information products. Ping Chen, Hai Xiao, Xiaobin Shen, Xinchun Yin, Bing Mao and Li Xie.
DROP: detecting return-oriented
programming malicious code. |
13:00 – 14:00 |
Lunch Break |
14:00 – 15:30 |
Technical Session 4 :: Behavior Analysis Lorenzo Martignoni, Roberto Paleari and Danilo Bruschi. A
framework for behavior-based malware analysis in the cloud. Vanessa Frias-Martinez, Salvatore Stolfo and Angelos D. Keromytis. BARTER:
behavior profile exchange for behavior-based admission and access control in
MANETs. Jonathan White and Brajendra Panda. Automatic identification of critical data
items in a database to mitigate the effects of malicious insiders. |
15:30 – 16:00 |
Tea/Coffee Break |
16:00 – 17:30 |
Technical Session 5 :: Database Security Gaurav Gupta and Josef Pieprzyk. Database relation watermarking resilient
against secondary watermarking attacks. Ge Fu, Hong Zhu, Yucai Feng and Yingjiu Li. A
robust damage assessment model for corrupted database systems. Sukriti Bhattacharya and Agostino Cortesi. A generic distortion free watermarking technique for relational databases. |
19:00 onwards |
Cultural Function + Banquet |
December 18, 2008
10:00 – 11:00 |
Keynote Talk 4 Title: Biometrics and Security Speaker: Venu Govindaraju, Director, Center for Unified Bioinformatics and Sensors, University of Buffalo, SUNY |
11:00 – 11:30 |
Tea/Coffee Break |
11:30 – 12:30 |
Technical Session 6 :: Cryptography Michael Adjedj, Julien
Bringer, HervŽ Chabanne
and Bruno Kindarji. Biometric identification over encrypted data made feasible. Shri Kant Ojha,
Naveen Kumar, Kritika Jain and Sangeeta.
TWIS – a lightweight block cipher. |
12:30 – 13:30 |
Technical Session 7 :: Short Papers Indranil Saha and Debapriyay Mukhopadhyay. Quantitative analysis of a probabilistic non-repudiation protocol
through model checking (short paper). Jeff Zarnett, Patrick Lam and Mahesh Tripunitara. Method-specific
Java access control via RMI proxy objects using annotations (short paper). Nagaraja Kaushik Gampa,
Rohit Ashok Khot and Kannan Srinathan. Let only the right one in: privacy
management scheme for social network (short paper). Ravi Mukkamala, Vishnu Kamisetty and Pawankumar Yedugani. Detecting
and resolving misconfigurations in role-based
access control (short paper). |
13:30 – 13:45 |
Closing Session |
13:30 – 14:30 |
Lunch Break |