Monday, July 16th

9.30 - 9.35: Welcome Address
9.35 - 10.35: Invited Talk (TBA)
10.35 - 11.05: Coffee Break
11.05 - 12.30: Session 1 - Administration
Modeling and Mitigating the Insider Threat of Remote Administrators in Clouds
Nawaf Alhebaishi, Lingyu Wang, Sushil Jajodia and Anoop Singhal
Blockchain-based Auditing of Transparent Log Servers
Long Nguyen, Jean-Philippe Eisenbarth, Claudia-Lavinia Ignat and Olivier Perrin
(short) Probabilistic Event Graph to Model Safety and Security for Diagnosis Purposes
Edwin Bourget, Frédéric Cuppens, Nora Cuppens-Boulahia, Samuel Dubus, Simon Foley and Youssef Laarouchi
12.30 - 14.00: Lunch
14.00 - 15.50: Session 2 - Access Control Policies
Enabling the deployment of ABAC policies in RBAC systems
Gunjan Batra, Vijayalakshmi Atluri, Jaideep Vaidya and Shamik Sural
Policy Languages and Their Suitability for Trust Negotiation
Martin Kolar, Carmen Fernández-Gago and Javier Lopez
(short) Role of Apps in Undoing of Privacy Policies on Facebook
Vishwas Patil and R.K. Shyamasundar
(short) Towards Adaptive Access Control
Luciano Argento, Andrea Margheri, Federica Paci, Nicola Zannone and Vladimiro Sassone
15.50 - 16.20: Coffee break
16.20 - 18.30: Social event - Guided tour of Città Alta
18.30 - 20.00: Refreshments

Tuesday, July 17th

9.30 - 10.30: Invited Talk (TBA)
10.30 - 11.00: Coffee Break
11.00 - 12.30: Session 3 - Privacy-Preserving Access and Computation
Oblivious Dynamic Searchable Encryption on Distributed Cloud Systems
Thang Hoang, Attila A. Yavuz, Betul F. Durak and Jorge Guajardo
Privacy-Preserving Planarity Testing of Distributed Graphs
Tamir Tassa and Guy Barshap
Image Pixelization with Differential Privacy
Liyue Fan
12.30 - 14.00: Lunch
14.00 - 15.30: Session 4 - Integrity and User Interaction
Data Integrity Verification in Column-Oriented NoSQL Databases
Grisha Weintraub and Ehud Gudes
A Novel Hybrid Password Authentication Scheme Based on Text and Image
Ian Mackie and Merve Yildirim
"It's shocking!": Analysing the Impact and Reactions to the A3: Android Apps Behaviour Analyser
Majid Hatamian, Agnieszka Kitkowska, Jana Korunovska and Sabrina Kirrane
15.30 - 16.00: Coffee break
16.00 - 17.40: Session 5 - Fixing Vulnerabilities and Security Analysis
Breaking and Fixing the Security Proof of Garbled Bloom Filters
Cédric Van Rompay and Melek Önen
USBlock: Blocking USB-based Keypress Injection Attacks
Sebastian Neuner, Artemios G. Voyiatzis, Spiros Fotopoulos, Collin Mulliner and Edgar R. Weippl
(short) FlowConSEAL: Automatic Flow Consistency Analysis of SEAndroid and SELinux Policies
Radhika B S, N V Narendra Kumar and R K Shyamasundar
(short) ContextDroid: Analyzing Contextual Permission Usage of Android Apps
Md Zakir Hossen and Mohammad Mannan
17.40 - 18.00: Business meeting
20.00 - 23.00: Banquet

Wednesday July 18

9.30 - 10.30: Invited Talk (TBA)
10.30 - 11.00: Coffee break
11.00 - 13.00: Session 6 - Networked Systems
Virtually Isolated Network: A Hybrid Network to Achieve High Level Security
Jia Xu and Jianying Zhou
Fingerprinting Crowd Events in Content Delivery Networks: a Semi-Supervised Methodology
Amine Boukhtouta, Makan Pourzandi, Richard Brunner and Stéphane Dault
Assessing Attack Impact on Business Processes by Interconnecting Attack Graphs and Entity Dependency Graphs
Chen Cao, Lun-Pin Yuan, Anoop Singhal, Peng Liu, Xiaoyan Sun and Sencun Zhu
Private yet Efficient Decision Tree Evaluation
Marc Joye and Fariborz Salehi
13.00 - 14.00: Lunch