Monday, July 16th

9.30 - 9.35: Welcome Address
9.35 - 10.35: Keynote: Securing Artificial Intelligence/Big Data Pipelines
Ernesto Damiani, Università degli Studi di Milano
10.35 - 11.05: Coffee Break
11.05 - 12.30: Session 1 - Administration (Chair: R. K. Shyamasundar)
Modeling and Mitigating the Insider Threat of Remote Administrators in Clouds
Nawaf Alhebaishi, Lingyu Wang, Sushil Jajodia and Anoop Singhal
Blockchain-based Auditing of Transparent Log Servers
Long Nguyen, Jean-Philippe Eisenbarth, Claudia-Lavinia Ignat and Olivier Perrin
(short) Probabilistic Event Graph to Model Safety and Security for Diagnosis Purposes
Edwin Bourget, Frédéric Cuppens, Nora Cuppens-Boulahia, Samuel Dubus, Simon Foley and Youssef Laarouchi
12.30 - 14.00: Lunch
14.00 - 15.50: Session 2 - Access Control Policies (Chair: Jianying Zhou)
Enabling the deployment of ABAC policies in RBAC systems
Gunjan Batra, Vijayalakshmi Atluri, Jaideep Vaidya and Shamik Sural
Policy Languages and Their Suitability for Trust Negotiation
Martin Kolar, Carmen Fernández-Gago and Javier Lopez
(short) Role of Apps in Undoing of Privacy Policies on Facebook
Vishwas Patil and R.K. Shyamasundar
(short) Towards Adaptive Access Control
Luciano Argento, Andrea Margheri, Federica Paci, Nicola Zannone and Vladimiro Sassone
15.50 - 16.20: Coffee break
16.20 - 18.30: Social event - Guided tour of Città Alta
18.30 - 20.00: Refreshments

Tuesday, July 17th

9.30 - 10.30: Keynote: Security in the edge computing environment: Challenges and Opportunities
Jaideep Vaidya, Rutgers University
10.30 - 11.00: Coffee Break
11.00 - 12.30: Session 3 - Privacy-Preserving Access and Computation (Chair: Ken Barker)
Oblivious Dynamic Searchable Encryption on Distributed Cloud Systems
Thang Hoang, Attila A. Yavuz, Betul F. Durak and Jorge Guajardo
Privacy-Preserving Planarity Testing of Distributed Graphs
Tamir Tassa and Guy Barshap
Image Pixelization with Differential Privacy
Liyue Fan
12.30 - 14.00: Lunch
14.00 - 15.30: Session 4 - Integrity and User Interaction (Chair: Joerg Sack)
Data Integrity Verification in Column-Oriented NoSQL Databases
Grisha Weintraub and Ehud Gudes
A Novel Hybrid Password Authentication Scheme Based on Text and Image
Ian Mackie and Merve Yildirim
"It's shocking!": Analysing the Impact and Reactions to the A3: Android Apps Behaviour Analyser
Majid Hatamian, Agnieszka Kitkowska, Jana Korunovska and Sabrina Kirrane
15.30 - 16.00: Coffee break
16.00 - 17.40: Session 5 - Fixing Vulnerabilities and Security Analysis (Chair: Ehud Gudes)
Breaking and Fixing the Security Proof of Garbled Bloom Filters
Cédric Van Rompay and Melek Önen
(short) FlowConSEAL: Automatic Flow Consistency Analysis of SEAndroid and SELinux Policies
Radhika B S, N V Narendra Kumar and R K Shyamasundar
(short) ContextDroid: Analyzing Contextual Permission Usage of Android Apps
Md Zakir Hossen and Mohammad Mannan
USBlock: Blocking USB-based Keypress Injection Attacks
Sebastian Neuner, Artemios G. Voyiatzis, Spiros Fotopoulos, Collin Mulliner and Edgar R. Weippl
17.40 - 18.00: Business meeting
20.00 - 23.00: Banquet

Wednesday July 18

9.30 - 10.30: Keynote: Blockchain and Hyperledger Fabric
Alessandro Sorniotti, IBM Research
10.30 - 11.00: Coffee break
11.00 - 13.00: Session 6 - Networked Systems (Chair: Nawaf Alhebaishi)
Virtually Isolated Network: A Hybrid Network to Achieve High Level Security
Jia Xu and Jianying Zhou
Fingerprinting Crowd Events in Content Delivery Networks: a Semi-Supervised Methodology
Amine Boukhtouta, Makan Pourzandi, Richard Brunner and Stéphane Dault
Assessing Attack Impact on Business Processes by Interconnecting Attack Graphs and Entity Dependency Graphs
Chen Cao, Lun-Pin Yuan, Anoop Singhal, Peng Liu, Xiaoyan Sun and Sencun Zhu
Private yet Efficient Decision Tree Evaluation
Marc Joye and Fariborz Salehi
13.00 - 14.00: Lunch