[Tccc] SafeConfig 2012 -- Call for Participation
Al-Shaer, Ehab
ealshaeratuncc.edu
Tue Sep 25 20:49:24 EDT 2012
The 5th Symposium on Configuration Analytics and Automation will be
Collocated with the 8th Annual Security Automation Conference 2012 at The
Baltimore Convention Center <http://www.bccenter.org/> . Here is the program
and more information about location and travel grant can be found at:
www.safeconfig.org.
SafeConfig 2012: Technical Program
Day 1 : October 3
10.45
-
11.00
Welcome
11.00
-
11.45
Invited talk by Nick Feamster, University of Maryland and Georgia Tech.
11.45
-
12.30
Session I: Configuration modeling and checking
Towards A Unified Modeling and Verification of Network and System Security
Configuration
Mohammed Noraden Alsaleh, University of North Carolina Charlotte; Ehab
Al-Shaer, University of North Carolina Charlotte; Adel El-Atawy, Google
Modeling and Checking the Security of DIFC System Configuration
Mingyi Zhao, Pennsylvania State University; Peng Liu, Pennsylvania State
University
12.30
-
1.30
Lunch
1:30
-
3:00
Session II: Vulnerability and risk assessment
Increasing Android Security using a Lightweight OVAL-based Vulnerability
Assessment Framework
Martn Barrre, INRIA; Gatan Hurel, INRIA; Remi Badonnel, LORIA; Olivier
Festor, INRIA Nancy - Grand Est
A Declarative Logic-based Approach for Threat Analysis of Advanced Metering
Infrastructure
Mohammad Ashiqur Rahman, University of North Carolina Charlotte; Ehab
Al-Shaer, University of North Carolina Charlotte
Risk based Access Control using Classification
Nazia Badar, Rutgers University; Jaideep Vaidya, Rutgers University; Vijay
Atluri, Rutgers University; Basit Shafiq, LUMS
3:00
-
3:45
Break
3:45
4:30
Invited talk by Alex Liu, Michigan State University.
4:30
-
5:15
Panel discussion: Configuration challenges for next-generation systems and
networks
Panelists: Nick Feamster, Alex Liu, Ehab Al-Shaer
Moderator: Geoffrey Xie
Day 2 : October 4
11:00
-
12:30
Session III: Configuration analytics
Generic Configuration Navigation System
Shankaranarayanan Puzhavakath Narayanan, Purdue University; Seungjoon Lee,
AT&T Labs Research; Subhabrata Sen, AT&T Labs Research
The Right Files at the Right Time
Hayawardh Vijayakumar, Pennsylvania State University; Trent Jaeger,
Pennsylvania State University
Rule Configuration Checking in Secure Cooperative Data Access
Meixing Le,George Mason University; Krishna Kant, National Science
Foundation; Sushil Jajodia, George Mason University
12:30
-
1:30
Lunch
1:30
-
3:00
Session IV: Diagnostics and discovery
Programmable Diagnostic Network Measurement with Localization and Traffic
Observation
Michael Clement, Naval Postgraduate School; Dennis Volpano, Naval
Postgraduate School
Discovery of Unexpected Services and Communication Paths in Networked
Systems (short paper)
Ichita Higurashi, University of Tsukuba; Akira Kanaoka, University of
Tsukuba; Masahiko Kato, Internet Initiative Japan Inc.; Eiji Okamoto,
University of Tsukuba
Tracing Attacks on Advanced Persistent Threat in Networked Systems
Masahiko Kato, Internet Initiative Japan Inc.; Takumi Matsunami, Kyushu
Institute of Technology; Akira Kanaoka,University of Tsukuba; Hiroshi Koide,
Kyushu Institute of Technology; Eiji Okamoto, University of Tsukuba
3:00
-
3:45
Break and Poster Session
---------------------------------------------------------------------------
Ehab Al-Shaer, PhD |
Professor and Director of Cyber Defense and Network Assurability (CyberDNA)
Research Center
UNC Charlotte | Dept. of Software and Information Systems (Woodward
Building)
9201 University City Blvd. | Charlotte, NC 28223
Phone: 704-687-8663 | Fax: 704-687-6065
ealsh... at uncc.edu | http://www.cyberDNA.uncc.edu/~ehab
---------------------------------------------------------------------------
_______________________________________________
IEEE Communications Society Tech. Committee on Computer Communications
(TCCC) - for discussions on computer networking and communication.
Tccc at lists.cs.columbia.edu
https://lists.cs.columbia.edu/cucslists/listinfo/tccc
More information about the TCCC
mailing list