Software Engineering for Secure Systems (SESS05)

Building Trustworthy Applications

Final program

May 15, morning session

Chair: Danilo Bruschi, Università degli Studi di Milano, Italy
Long presentations (20 minutes + 5 Q&A)
9:00
Omer Demir, Prem Devanbu (University of California, Davis, USA), Nenad Medvidovic (University of Southern California, USA), and Eric Wohlstadter (University of British Columbia, Vancouver, B.C., Canada),
DISCOA: Architectural Adaptations for Security and QoS
9:25
Maarten Rits, Benjamin De Boe, and Andreas Schaad (SAP Research, France).
XacT: A Bridge between Resource Management and Access Control in Multi-layered Applications
Short presentations (10 minutes + 5 Q&A)
9:50
Somo Banerjee, Chris A. Mattmann, Nenad Medvidovic, Leana Golubchik (University of Southern California, USA)
Leveraging Architectural Models to Inject Trust into Software Systems
10:05
Discussion
10:35
Coffee break
Long presentations (20 minutes + 5 Q&A)
11:00
Jie Ren, Richard Taylor, Paul Dourish, David Redmiles (Institute for Software Research, University of California, Irvine, USA),
Towards An Architectural Treatment of Software Security: A Connector-Centric Approach
11:25
Bart De Win, Frank Piessens, Jan Smans, Wouter Joosen (Katholieke Universiteit Leuven, Belgium),
Towards a Unifying View on Security Contracts
Short presentations (10 minutes + 5 Q&A)
11:50
Tine Verhanneman , Frank Piessens, Bart De Win, and Wouter Joosen (Katholieke Universiteit Leuven, Belgium),
Requirements Traceability to Support Evolution of Access Control
12:05
Discussion
12:30
Lunch

May 15, afternoon session

Chair: Bart de Win, Katholieke Universiteit Leuven, Belgium
Long presentations (20 minutes + 5 Q&A)
14:00
Seok-Won Lee, Robin Gandhi, and Gail-Joon Ahn (The University of North Carolina at Charlotte, USA),
Establishing Trustworthiness in Services of the Critical Infrastructure through Certification and Accreditation
14:25
Zaid Dwaikat (Systems and Software Consortium, George Mason University, USA), and Francesco Parisi-Presicce (George Mason University, USA -- Università di Roma La Sapienza, Italy),
Risky Trust: Risk-Based Analysis of Software Systems
Short presentations (10 minutes + 5 Q&A)
14:50
Nancy R. Mead, Ted Stehney (Carnegie Mellon University, USA),
Security Quality Requirements Engineering (SQUARE) Methodology
15:05
Karsten Sohr, and Lars Migge (Universität Bremen, Germany), Gail-Joon Ahn (University of North Carolina at Charlotte, USA)
Articulating and Enforcing Authorisation Policies with UML and OCL
15:30
Coffee break
16:00
Discussion
17:00
Closing remarks

May 16, morning session

Chair: Mattia Monga, Università degli Studi di Milano, Italy
Long presentations (20 minutes + 5 Q&A)
9:00
Ben Breech, and Lori Pollock (University of Delaware, USA),
A Framework for Testing Security Mechanisms for Program-Based Attacks
9:25
Sam Weber, Paul Karger, and Amit Paradkar (IBM Corporation, T. J. Watson Research Center, USA),
A Software Flaw Taxonomy: Aiming Tools at Security
Short presentations (10 minutes + 5 Q&A)
9:50
Wes Masri (American University of Beirut, Lebanon), and Andy Podgurski (Case Western Reserve University, USA),
Using Dynamic Information Flow Analysis to Detect Attacks against Applications
10:05
Discussion
10:30
Coffee break
Long presentations (20 minutes + 5 Q&A)
11:00
Mike Jochen, Anteneh Addis Anteneh, Lori Pollock (University of Delaware, USA), and Lisa Marvel (U.S. Army Research Laboratory, USA),
Enabling Control over Adaptive Program Transformation for Dynamically Evolving Mobile Software Validation
11:25
Michael Gegick, and Laurie Williams (North Carolina State University, USA),
Matching Attack Patterns to Security Vulnerabilities in Software-Intensive System Designs
11:45
Discussion
12:15
Workshop closing remarks

Mattia Monga mattia.monga@unimi.it

Valid XHTML 1.0! Last modified: Sun May 15 13:54:57 CEST 2005
$Id: program.html,v 1.1 2005/04/23 14:07:08 monga Exp monga $