Enterprise Security Workshop
General Information
Full Workshop Call For Papers
Registration
Electronic submission
Agenda
Program Committee
General Information
WET ICE '99 Home Page
IEEE Format for
Proceedings
IEEE Copyright
Policies
Previous WET ICE
Workshops
Participating Organizations
IEEE
IEEE Computer Society
CERC, West Virginia University
Center for Design Research, Stanford University
|
The Program of the Entreprise Security Workshop
|
Time | Day |
Wednesday June 16th, 1999 |
07:30-
8:30 |
Breakfast
On-site Registration begins
Skilling Auditorium |
08:30
- 09:00 |
Opening remarks, General Chair
Introduction of workshop organizers/chairs
Workshop charge
Skilling Auditorium
|
09:00
- 10:00
|
Plenary talk, Andrew
Watson, Vice President and Technical Director, OMG:
"Application Integration Using Object Technology"
Skilling Auditorium |
10:00 - 10:30 |
Break |
10:30
- 12:30 |
Opening
Talk, Yahya Al-Salqan, Workshop General Chair,
Technical Paper Presentation,
Access Control in a Virtual University
by: Trent Jaeger, Roy Rada and Tony Michailidis
Using SESAME to Implement Role Based Access Control
in Unix File Systems
by: Mark Vandenwauver and Paul Ashley
Deriving Object Based Access Control Model from
the OBBAC Model
by: J.-M. Kabasele Tenday, J.-J. Quisquater, M. Lobelle
Terman, Room 101
|
12:30
- 13:30 |
Lunch (on your own) |
13:30
- 15:00 |
Panel
on "Authorization Requirements and Solutions for Collaborative Entreprises"
Terman, Room 101
|
15:00
- 15:30 |
Break |
15:30
- 17:30 |
Technical Paper Presentations,
Why Firewalls and Intrusion Detection Systems Don't
Provide Perfect Security?
by: Mark Vandenwauver, Joris Claessens, Wim Moreau,
Calin Vaduva, Robert Maier
Single Sign On Using Cookies for Web Applications
by: Vipin Samar
Protecting the Hosted Application Server
by: Owen Rees and Paola Dotti
Terman, Room 101
|
Evening |
Group Dinner at Rodin
Sculpture Garden |
|
|
Time | Day |
Thursday June 17th, 1999 |
07:30-
8:30 |
Breakfast
On-site Registration begins
Skilling Auditorium |
08:30
- 09:30 |
Plenary talk, Dr. Ram D. Sriram, Group
Leader, Engineering Design
Technologies, Manufacturing Engineering Laboratory,
National Institute of Standards and Technology, NIST:
"Distributed and Collaborative Design Activities
at NIST"
Skilling Auditorium
|
09:30
- 10:45
|
Technical Paper Presentation,
Secure In-band Update of Trusted Certificates
by: James M. Hayes
Secure and Efficient Schemes to Entrust the Use
of Private Keys
by: Masaki Kyojima and Kil-ho Shin,
Terman, Room 101
|
10:45 - 11:15 |
Break |
11:15
- 12:30 |
Technical
Paper Presentation,
"Timestamps: Main issues on their use and implementation"
by: H. Massias, X. A. Serret and J.-J. Quisquater
"Static Analysis of Binary Code to Isolate Malicious
Behaviors"
by: M. Debbabi, J. Bergeron, M. Erhioui and B. Ktari
Terman, Room 101
|
12:30
- 13:30 |
Lunch (on your own) |
13:30
- 15:00 |
Panel
on "PKI Infrastructure"
Terman, Room 101
|
15:00
- 15:30 |
Break |
15:30
- 17:30 |
Short Paper Presentations
Verifying Workflow Process Against Organization
Security Policies
by: Carlos Ribeiro and Paulo Guedes
Incremental Analysis and Verification of Authentication
Protocols
by: Takamichi Saito, Wu Wen and Fumio Mizogushi
Establishing a Secure Multicast Group for Remote Software Delivery
by: Lin Han and Nahid Shahmehri
Terman, Room 101
|
|
|
Time | Day |
Friday June 18th, 1999 |
07:30-
8:30 |
Breakfast
On-site Registration begins
Skilling Auditorium |
08:30
- 12h30 |
Group discussion
Terman, Room 101
|
12:30
- 13:30 |
Lunch (on your own) |
13:30
- 15:00 |
All Workshops Together:
Best Paper Award
Final Group Reports
Skilling Auditorium |
15:00
- 15:30 |
Break |
15:30
- 17:30 |
Final Group Reports (Continued)
Closing Remarks
Skilling Auditorium |
|
|