2/21/2011 7:00am-8:00am Breakfast
8:00am-8:30am Welcome Ravi Sandhu, Elisa Bertino, Jeff Reich
8:30am-9:30am Inaugural Keynote Talk:  The Challenge of Data and Application Security: Are We Up to It? Ravi Sandhu, UTSA
9:30am-10:30am KeyNote Talk 1:  Key Dependent Message Security: Recent Results and Applications Moti Yung, Google
10:30am-11:00am Coffee Break
11:00am-12:30pm Paper Session 1 (3 papers): Security and Privacy Techniques for Social Networks Session Chair: Murat Kantarcioglu (University of Texas at Dallas)
Towards Active Detection of Identity Clone Attacks on Online Social Networks Lei Jin, University of Pittsburgh; James Joshi, University of Pittsburgh;  Hassan Takabi, University of Pittsburgh
Virtual Private Social Networks Mauro Conti, Vrije Universiteit Amsterdam;  Arbnor Hasani, Vrije Universiteit Amsterdam;   Bruno Crispo, University of Trento
A Probability-based Approach to Modeling the Risk of Unauthorized Propagation of Information in On-line Social Networks Barbara Carminati, University of Insubria;  Elena Ferrari, University of Insubria;
Sandro Morasca, University of Insubria;  Davide Taibi, University of Insubria; 
12:30pm-1:30pm Lunch
1:30pm-3:00pm Paper Session 2 (3 papers): Insider Threats and Data Leakage Session Chair: Ram Krishnan (University of Texas at San Antonio) 
Detection of Anomalous Insiders in Collaborative Environments via Relational Analysis of Access Logs You Chen, Vanderbilt University; Bradley Malin, Vanderbilt University
LeakProber: A framework for profiling sensitive data leakage path Junfeng Yu, Pennsylvania State University University Park; ShengZhi Zhang, Pennsylvania State University University Park; Zhitang Li, Huazhong university of Sci&Tech; Peng Liu, Pennsylvania State University University Park
Distributed Data Usage Control for Web Applications: A Social Network Implementation Prachi Kumari, Karlsruhe Institute of Technology; Alexander Pretschner, Karlsruhe Institute of Technology; Jonas Peschla, TU Kaiserslautern; Jens-Michael Kuhn, TU Kaiserslautern
3:00pm-3:30pm Coffee Break
3:30pm-5:00pm Paper Session 3 (3 papers): Performance Evaluation and Enhancement Session Chair: James Joshi (University of Pittsburgh)
MyABDAC: Compiling XACML Policies for Attribute-Based Database Access Control Sonia Jahid, University of Illinois at Urbana-Champaign; Imranul Hoque, University of Illinois at Urbana-Champaign; Carl A. Gunter, University of Illinois at Urbana-Champaign; Hamed Okhravi, University of Illinois at Urbana-Champaign
Implementation and Performance Evaluation of Privacy-Preserving Fair Reconciliation Protocols on Ordered Sets Daniel A. Mayer, Stevens Institute of Technology; Susanne Wetzel, Stevens Institute of Technology; Ulrike Meyer, RWTH Aachen; Dominik Teubert, RWTH Aachen
An Empirical Assessment of Approaches to Distributed Enforcement in Role-Based Access Control (RBAC) Marko Komlenovic, University of Waterloo; Mahesh Tripunitara, University of Waterloo; Toufik Zitouni, University of Waterloo
2/22/2011 7:30am-8:30am Breakfast
8:30am-9:30am KeyNote Talk 2: Old, New, Borrowed, Blue -- A perspective on the evolution of
mobile platform security architectures
N. Asokan, Nokia
9:30am-10:30 Paper session 4 (2 papers): Secure Provenance Session Chair: Ravi Sandhu (University of Texas at San Antonio)
A Language for Provenance Access Control Tyrone Cadenhead, University of Texas at Dallas; Vaibhav Khadilkar, University of Texas at Dallas; Murat Kantarcioglu, University of Texas at Dallas; Bhavani Thuraisingham, University of Texas at Dallas
Non-Interactive Editable Signatures for Assured Data Provenance Haifeng Qian, East China Normal University; Shouhuai Xu, University of Texas at San Antonio
10:30am-11:00am Coffee Break
11:00am-12:30pm Paper Session 5 (3 papers): Privacy Threats and Protection Techniques Session Chair:  Barbara Carminati (University of Insubria)
Identifying a Critical Threat to Privacy through Automatic Image Classification David Lorenzi, Rutgers University; Jaideep Vaidya, Rutgers University
k-out-of-n Oblivious Transfer based on Homomorphic Encryption and Solvability of Linear Equations Mummoorthy Murugesan, Purdue University; Wei Jiang, Missouri University of Science and Technology; Ahmet Erhan Nergiz, Purdue University; Serkan Uzunbaz, Purdue University
Mixture of Gaussian Models and Bayes Error under Differential Privacy Bowei Xu, Purdue Universityi; Murat Kantarcioglu, University of Texas at Dallas; Ali Inan, Isik University
12:30pm-1:30pm Lunch
1:30pm-3:00pm Paper Session 6 (3 papers):  Novel Models and Systems for Access Control Session Chair: Dan Thomsen
Relationship-Based Access Control: Protection Model and Policy Language Philip Fong, University of Calgary
Enforcing Physically Restricted Access Control for Remote Data Michael Kirkpatrick, Purdue University; Sam Kerr, Purdue University
Towards Defining Semantic Foundations for Purpose-Based Privacy Policies Mohammad Jafari, University of Calgary; Philip Fong, University of Calgary; Reihaneh Safavi-Naini, University of Calgary; Ken Barker, University of Calgary; Nicholas Paul Sheppard, Queensland University of Technology
3:00pm-3:30pm Coffee Break
3:30pm-5:00pm Session 7:  Invited Industry and Application Papers Session Chair: Elisa Bertino (Purdue University)
Practical Policy Patterns Dan Thomsen (Sandia)
Security Challenges for Embedded Systems Hal Aldridge (Sypris Electronics)
The Optimization of Situational Awareness for Insider Threat Detection Kenneth Brancik (Northrop Grumman), Gabriel Ghinita (Purdue University)
2/23/2011 7:00am-8:00am Breakfast
8:00am-9:00am KeyNote Talk 3:  Software Security: Is OK good enough? John Dickson, Denim Group
9:00am-10:00am Paper session 8 (2 papers): Secure Data Outsourcing Session Chair:  Gabriel Ghinita (Purdue University) 
Fair and Dynamic Proofs of Retrievability Qingji Zheng, University of Texas at San Antonio; Shouhuai Xu, University of Texas at San Antonio
RASP: Efficient Multidimensional Range Query on Attack-Resilient Encrypted Databases Keke Chen, Wright State University; Ramakanth Kavuluru, Wright State University; Shumin Guo, Wright State University
10:00am-10:30am Coffee Break
10:30am-11:30am Paper session 9 (2 papers):  Novel Applications of Privacy Techniques Session Chair: Keke Chen (Wright State University)
Privacy-Preserving Activity Scheduling on Mobile Devices Igor Bilogrevic, EPFL; Murtuza Jadliwala, EPFL; Jean-Pierre Hubaux, EPFL; Imad Aad, Nokia;  Valtteri Niemi, Nokia
Privacy-Enhanced Reputation-Feedback Methods to Reduce Feedback Extortion in Online Auctions Michael Goodrich, University of California, Irvine; Florian Kerschbaum, SAP Research
11:30am-12:30pm Panel: Research Agenda for Data and Application Security Panel Chair: X. Sean Wang (University of Vermont)
Conti (Vrije Universiteit Amsterdam)
Calton Pu (Georgia Tech)
Ravi Sandhu (UTSA)
Dan Thomsen (Sandia)
Bhavani Thuraisingham (UTDallas)
12:30pm-12:45pm Conference Closing and Concluding Remarks