Software Engineering for Secure Systems (SESS05)
Building Trustworthy Applications
Final program
May 15, morning session
Chair: Danilo Bruschi, Università degli Studi di Milano, Italy
Long presentations (20 minutes + 5 Q&A)
- 9:00
- Omer
Demir, Prem Devanbu (University of
California,
Davis, USA), Nenad Medvidovic (University of
Southern California, USA), and Eric Wohlstadter
(University of British Columbia, Vancouver, B.C., Canada),
DISCOA: Architectural Adaptations for Security and QoS
- 9:25
- Maarten Rits, Benjamin De Boe,
and Andreas Schaad (SAP
Research, France).
XacT: A Bridge between Resource
Management and Access Control in
Multi-layered Applications
Short presentations (10 minutes + 5 Q&A)
- 9:50
- Somo Banerjee, Chris
A. Mattmann, Nenad Medvidovic, Leana
Golubchik (University of Southern California,
USA)
Leveraging Architectural Models to Inject
Trust into Software Systems
- 10:05
- Discussion
- 10:35
- Coffee break
Long presentations (20 minutes + 5 Q&A)
- 11:00
- Jie Ren, Richard Taylor,
Paul Dourish, David Redmiles
(Institute for Software Research,
University of California, Irvine, USA),
Towards An
Architectural Treatment of Software Security: A
Connector-Centric Approach
- 11:25
- Bart De Win,
Frank Piessens, Jan Smans,
Wouter Joosen (Katholieke Universiteit Leuven,
Belgium),
Towards a Unifying View on Security
Contracts
Short presentations (10 minutes + 5 Q&A)
- 11:50
-
Tine Verhanneman , Frank Piessens,
Bart De Win, and Wouter Joosen (Katholieke Universiteit Leuven,
Belgium),
Requirements Traceability to Support Evolution of Access
Control
- 12:05
- Discussion
- 12:30
- Lunch
May 15, afternoon session
Chair: Bart de Win, Katholieke Universiteit Leuven,
Belgium
Long presentations (20 minutes + 5 Q&A)
- 14:00
- Seok-Won
Lee, Robin Gandhi, and Gail-Joon
Ahn (The University of North Carolina at Charlotte, USA),
Establishing Trustworthiness in Services of the Critical
Infrastructure through Certification and Accreditation
- 14:25
- Zaid
Dwaikat (Systems and Software Consortium, George Mason
University,
USA), and Francesco Parisi-Presicce (George Mason
University, USA
-- Università di Roma La Sapienza, Italy),
Risky Trust: Risk-Based Analysis of Software
Systems
Short presentations (10 minutes + 5 Q&A)
- 14:50
- Nancy R. Mead, Ted Stehney
(Carnegie Mellon University, USA),
Security Quality
Requirements Engineering (SQUARE)
Methodology
- 15:05
- Karsten Sohr, and Lars Migge (Universität Bremen, Germany),
Gail-Joon Ahn (University of North Carolina at
Charlotte, USA)
Articulating and Enforcing Authorisation
Policies with UML and OCL
- 15:30
- Coffee break
- 16:00
- Discussion
- 17:00
- Closing remarks
May 16, morning session
Chair: Mattia Monga, Università degli Studi di Milano, Italy
Long presentations (20 minutes + 5 Q&A)
- 9:00
- Ben Breech, and Lori Pollock
(University of Delaware, USA),
A Framework for Testing
Security Mechanisms for Program-Based
Attacks
- 9:25
- Sam Weber,
Paul Karger, and Amit Paradkar
(IBM Corporation, T. J. Watson Research Center, USA),
A
Software Flaw Taxonomy: Aiming Tools at Security
Short presentations (10 minutes + 5 Q&A)
- 9:50
- Wes Masri (American University of Beirut, Lebanon), and Andy
Podgurski (Case Western Reserve University, USA),
Using Dynamic Information Flow Analysis to Detect
Attacks against Applications
- 10:05
- Discussion
- 10:30
- Coffee break
Long presentations (20 minutes + 5 Q&A)
- 11:00
- Mike Jochen,
Anteneh Addis Anteneh, Lori
Pollock (University of Delaware, USA), and
Lisa Marvel (U.S. Army Research Laboratory, USA),
Enabling Control over Adaptive Program Transformation for
Dynamically Evolving Mobile Software Validation
- 11:25
- Michael Gegick, and Laurie
Williams (North Carolina State University, USA),
Matching Attack Patterns to Security Vulnerabilities in
Software-Intensive System Designs
- 11:45
- Discussion
- 12:15
- Workshop closing remarks
Mattia Monga mattia.monga@unimi.it
Last modified: Sun May 15 13:54:57 CEST 2005
$Id: program.html,v 1.1 2005/04/23 14:07:08 monga Exp monga $