The Westin Hotel
San Francisco, CA USA
May 24, 2012
Sponsored by
The IEEE Computer Society's Technical Committees:
Keynote Speaker: Jeannette Wing
President's Professor of Computer Science
and Department Head, Computer Science
Department, Carnegie Mellon University
- 8:30 - Welcome
- 8:35-9:20 Keynote Address: Jeannette Wing.
- 9:20-10:00 - Session I
- 9:20 - Matthew Burkholder and Rachel Greenstadt. Privacy in Online Review Sites.
- 9:40 - Sharon Paradesi, Oshani Seneviratne and Lalana Kagal. Policy Aware Social Miner.
- 10:00 - Coffee Break
- 10:30-12:00 - Session II
- 10:30 - Mathieu Jaume. Semantic comparison of security policies: from access control policies to flow properties.
- 10:50 - Christopher Griffin and Kathleen Moore. A Framework for Modeling Decision Making and Deception with Semantic Information
- 11:10 - Sumit More, Mary Mathews, Anupam Joshi and Tim Finin. A Knowledge-Based Approach To Intrusion Detection Modeling
- 11:30 - Dibyajyoti Ghosh, Anupam Joshi, Tim Finin and Pramod Jagtap. Privacy control in smart phones using semantically rich reasoning and context modeling
- 12:00 - Lunch
- 13:30-15:00 - Session III
- 13:30 - Hilarie Orman. Towards a Semantics of Phish.
- 13:50 - Jim Blythe and Jean Camp. Implementing Mental Models
- 14:10 - Hao Zhang, William Banick, Danfeng Yao and Naren Ramakrishnan. User Intention-Based Traffic Dependence Analysis For Anomaly Detection.
- 14:30 - Christopher Griffin and Anna Squicciarini. Toward a Game Theoretic Model of Information Release in Social Media with Experimental Results.
- 15:00 - Coffee Break
- 15:30-15:50 Session IV
- 15:30 - Jesus Navarro, Enrique Naudon and Daniela Oliveira. Bridging the Semantic Gap to Mitigate Kernel-level Keyloggers.
- 15:50-17:00 - Panel, Embedding Social Trust Policies in
Operating Systems or Browsers - Daniela Oliveira (chair, Rachel
Greenstadt, Jedidiah Crandall, Felix Wu
- 17:00 - End of Workshop
This workshop follows the successful September 2011 workshop at the
International Semantic Computing Symposium. This new workshop will
explore additional topics and allow semantic computing researchers to
have more opportunity to interact with security researchers.
Semantic Computing technologies derive and use semantics from
content, where “content” is wide-ranging: video, audio, text,
conversation, software, devices, actions, behavior, etc. Security
technology encompasses the specification of secure behavior as well as
the detection of insecure behavior over computer networks. The two
disciplines come together in this new and interesting combination, in a
synergy-seeking, cutting-edge workshop. The delimited notions of
semantics used within Security and Privacy provide a well-defined and as
yet unstudied domain for semantic modeling, automated semantic
interpretation, and inference, with clear practical uses and
opportunities for novel and imaginative research.
The workshop on Semantic Computing and Security addresses:
- deriving semantics from data used for security and privacy research;
- semantic verification of network activity; and
- inferring the semantics of malicious free-form data, such as email and web pages.
Topics of interest include but are not limited to:
- Network dataset curation through semantic derivation
- Semantic MediaWiki for vulnerability sharing and detecting emergent security properties
- Network security semantics, dynamic classification
- Inferred semantics of malicious code
- Semantic verification of network operations
- Semantic specification and analysis of security experiment design
- Semantic analysis of access control policies
- Semantics of data acquisition and computation provenance
- Semantic analysis of malware communication
- Semantics-aware trust management
SUBMISSIONS AND REGISTRATION
Authors are invited to submit Regular Papers (maximum 8 pages) or
Short Papers (maximum 4 pages) using EasyChair.
Regular papers will be evaluated
according to normal research conference criteria with respect to
relevance, originality, and quality of the methodology and writing.
Work that is highly novel, controversial, or preliminary can be
submitted as a short paper.
Papers accepted by the workshop will be published by the IEEE Computer
Society Press. Electronic media with the proceedings will be
distributed to attendees.
IMPORTANT DATES
- Regular & Short Paper Submission
deadline: February 28, 2012 (by 11:59 PM,
Pacific Standard time)
- Notification to authors: March 31, 2012
- Camera-Ready copy due: April 17, 2012
- Registration: early bird rates end
April 20, 2012
- Workshop: May 24, 2012
ORGANIZING COMMITTEE
- Alessandro Armando (co-chair), University of Genova & Fondazione Bruno Kessler
- Hilarie Orman (co-chair), Purple Streak
PROGRAM COMMITTEE
- Terry Benzel, Information Sciences Institute, University of Southern California
- L. Jean Camp, Indiana University
- Bruno Crispo, University of Trento
- Grit Denker, SRI International
- Eduard Hovy, Information Sciences Institute, University of Southern California
- Alefiya Hussain, Information Sciences Institute, University of Southern California
- Lalana Kagal, CSAIL, MIT
- Daniela Oliveira, Bowdoin College
- Pierangela Samarati, University of Milano
CONTACT
Hilarie
Orman, hilarie @ purplestreak.com
Alessandro
Armando, armando @ fbk.eu