{"id":282,"date":"2021-06-23T16:40:50","date_gmt":"2021-06-23T22:40:50","guid":{"rendered":"https:\/\/wpsites.ucalgary.ca\/dbsec2021\/?page_id=282"},"modified":"2021-07-08T08:44:38","modified_gmt":"2021-07-08T14:44:38","slug":"conference-program","status":"publish","type":"page","link":"https:\/\/wpsites.ucalgary.ca\/dbsec2021\/conference-program\/","title":{"rendered":"Conference Program"},"content":{"rendered":"\n<div class=\"wp-block-file\"><a href=\"https:\/\/wpsites.ucalgary.ca\/dbsec2021\/wp-content\/uploads\/sites\/104\/2021\/07\/DBSec2021_Program-1.xlsx\"><a href=\"https:\/\/wpsites.ucalgary.ca\/dbsec2021\/wp-content\/uploads\/sites\/104\/2021\/06\/DBSec2021_Program-1.xlsx\">Download the conference program file here.<\/a><\/a><a href=\"https:\/\/wpsites.ucalgary.ca\/dbsec2021\/wp-content\/uploads\/sites\/104\/2021\/07\/DBSec2021_Program-1.xlsx\" class=\"wp-block-file__button\" download>Download<\/a><\/div>\n\n\n\n<p class=\"has-headings-color has-text-color\">The links to the conference sessions will be sent to your email by July 15th.  Please make sure to <a rel=\"noreferrer noopener\" href=\"https:\/\/docs.google.com\/forms\/d\/e\/1FAIpQLSfUfCvDnYn3lRmA7czXQdTYg9FV6ljOmerHz2NRnKUjhsYbmQ\/viewform?usp=sf_link\" target=\"_blank\"><strong>register<\/strong><\/a> before the deadline to receive the links.<\/p>\n\n\n\n<ul class=\"has-headings-color has-text-color wp-block-list\"><li>Please note that:<ul><li>For <strong>full<\/strong> papers, the presentation should *not* exceed 15 minutes with 5 minutes for Q\/A.<\/li><li>For <strong>short<\/strong> papers, the presentation should *not* exceed 10 minutes with 5 minutes for Q\/A.<\/li><\/ul><\/li><\/ul>\n\n\n\n<p class=\"has-accent-1-color has-text-color has-large-font-size\">Monday, July 19, 2021 (Day One)<\/p>\n\n\n\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-vertically-aligned-top is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:100%\">\n<div class=\"wp-block-group\"><div class=\"wp-block-group__inner-container is-layout-flow wp-block-group-is-layout-flow\">\n<figure class=\"wp-block-table is-style-regular\"><table><tbody><tr><td><strong>Session One<\/strong><\/td><td><strong>Title<\/strong><\/td><\/tr><tr><td><strong><span class=\"has-inline-color has-headings-color\">9:00-11:00 <\/span><\/strong><br>(Calgary Time)<\/td><td><span class=\"has-inline-color has-headings-color\"><strong>DPNeT: Differentially Private Network Traffic Synthesis with Generative Adversarial Networks<\/strong><\/span><br><em>Liyue Fan and Akarsh Pokkunuru<\/em><br><br><strong>Comparing local and central differential privacy using membership inference attacks<\/strong><br><em>Daniel Bernau, Jonas Robl, Philip W. Grassal, Steffen Schneider and Florian Kerschbaum<\/em><br><br><strong>Preventing Manipulation Attack in Local Differential Privacy using Verifiable Randomization Mechanism<\/strong><br><em>Fumiyuki Kato, Yang Cao and Masatoshi Yoshikawa<\/em><br><br><strong>Simple Storage-Saving Structure for Volume-Hiding Encrypted Multi-Maps<\/strong><br><em>Jiafan Wang and Sherman S. M. Chow<\/em><br><br><strong>Distributed query evaluation over encrypted data<\/strong><br><em>Sabrina De Capitani di Vimercati, Sara Foresti, Sushil Jajodia, Giovanni Livraga, Stefano Paraboschi and Pierangela Samarati<\/em><br><br><strong>Nowhere to Leak: A Forward and Backward Private Symmetric Searchable Encryption in the Multi-Client Setting<\/strong><br><em>Alexandros Bakas and Antonis Michalas<\/em><\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td><strong>Session Two<\/strong><\/td><td><strong>Title<\/strong><\/td><\/tr><tr><td><strong>11:30-13:20<\/strong> <br>(Calgary Time)<\/td><td><strong>Multi-party Private Set Operations with an External Decider<\/strong><br><em>Sara Ramezanian, Tommi Meskanen and Valtteri Niemi<\/em><br><br><strong>Encrypted-Input Obfuscation of Image Classifiers<\/strong><br><em>Giovanni Di Crescenzo, Lisa Bahler, Brian Coan, Kurt Rohloff, Yuriy Polyakov and Dave Cousins<\/em><br><br><strong>Preserving Privacy of Co-Occurring Keywords over Encrypted Data<\/strong><br><em>D.V.N. Siva Kumar and P. Santhi Thilagam<\/em><br><br><strong>Verifiable Hierarchical Key Assignment Schemes<\/strong><br><em>Anna Lisa Ferrara, Federica Paci and Chiara Ricciardi<\/em><br><br><strong>An ABAC model with Trust and Gossiping (ABAC\u2013TG) for online social networks<\/strong><br><em>Adi Swissa and Ehud Gudes<\/em><br><br><strong>On Feasibility of Attribute-Aware Relationship Based Access Control Policy Mining<\/strong><br><em>Shuvra Chakraborty and Ravi Sandhu<\/em><\/td><\/tr><\/tbody><\/table><\/figure>\n<\/div><\/div>\n\n\n\n<p class=\"has-accent-1-color has-text-color has-large-font-size\">Tuesday, July 20, 2021 (Day Two)<\/p>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td><strong>Session Three<\/strong><\/td><td><strong>Title<\/strong><\/td><\/tr><tr><td><strong>9:00-11:10<\/strong> (Calgary Time)<\/td><td><strong>Not a Free Lunch, But a Cheap One: On Classifiers Performance on Anonymized Dataset<\/strong><br><em>Mina Sheikhalishahi and Nicola Zannone<\/em><br><br><strong>A Rewarding Framework for Crowdsourcing to Increase Privacy Awareness<\/strong><br><em>Ioannis Chrysakis, Giorgos Flouris, Maria Makridaki, Theodore Patkos, Yannis Roussakis, Georgios Samaritakis, Nikoleta Tsabanaki, Elias Tzortzakakis, Elisjana Ymeralli, Tom Seymoens, Anastasia Dimou and Ruben Verborgh<\/em><br><br><strong>DUCE: Distributed Usage Control Enforcement for Private Data Sharing in Internet of Things<\/strong><br><em>Na Shi, Bo Tang, Ravi Sandhu and Qi Li<\/em><br><br><strong>A Digital Twin-based Cyber Range for SOC Analysts<\/strong><br><em>Manfred Vielberth, Magdalena Glas, Marietheres Dietz, Stylianos Karagiannis, Emmanouil Magkos and G\u00fcnther Pernul<\/em><br><br><strong>Divide-and-Learn: A Random Indexing Approach to Attribute Inference Attacks in Online Social Networks<\/strong><br><em>Sanaz Eidizadehakhcheloo, Bizhan Alipour Pijani, Abdessamad Imine and Michael Rusinowitch<\/em><br><br><strong>The tkl-Score for Data-Sharing Misuseability<\/strong><br><em>Kalvin Eng and Eleni Stroulia<\/em><br><br><strong>Automated Risk Assessment and Trade-Off Analysis of OpenID Connect and OAuth 2.0 Deployments<\/strong><br><em>Salimeh Dashti, Amir Sharif, Roberto Carbone and Silvio Ranise<\/em><\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td><strong>Session Four<\/strong><\/td><td><strong>Title<\/strong><\/td><\/tr><tr><td><strong>11:30-13:10<\/strong> <br>(Calgary Time)<\/td><td><strong>Access Control Policy Generation From User Stories Using Machine Learning<\/strong><br><em>John Heaps, Ram Krishnan, Yufei Huang, Jianwei Niu and Ravi Sandhu<\/em><br><br><strong>Perun: Confidential Multi-Stakeholder Machine Learning Framework with Hardware Acceleration Support<\/strong><br><em>Wojciech Ozga, Do Le Quoc and Christof Fetzer<\/em><br><br><strong>PDF Malware Detection Using Visualization and Machine Learning<\/strong><br><em>Ching-Yuan Liu, Min-Yi Chiu, Qi-Xian Huang and Hung-Min Sun<\/em><br><br><strong>Deep Learning for Detecting Network Attacks: An End-to-end Approach<\/strong><br><em>Qingtian Zou, Anoop Singhal, Xiaoyan Sun and Peng Liu<\/em><br><br><strong>11.3 WG Business Meeting<\/strong><br><em>Dr. Sara Foresti<\/em><\/td><\/tr><\/tbody><\/table><\/figure>\n<\/div>\n<\/div>\n\n\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>The links to the conference sessions will be sent to your email by July 15th. Please make sure to register before the deadline to receive the links. Please note that: For full papers, the presentation should *not* exceed 15 minutes with 5 minutes for Q\/A. For short papers, the presentation &hellip;<\/p>\n","protected":false},"author":206,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"ngg_post_thumbnail":0,"footnotes":""},"class_list":["post-282","page","type-page","status-publish","hentry"],"featured_image_src":null,"featured_image_src_square":null,"_links":{"self":[{"href":"https:\/\/wpsites.ucalgary.ca\/dbsec2021\/wp-json\/wp\/v2\/pages\/282","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/wpsites.ucalgary.ca\/dbsec2021\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/wpsites.ucalgary.ca\/dbsec2021\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/wpsites.ucalgary.ca\/dbsec2021\/wp-json\/wp\/v2\/users\/206"}],"replies":[{"embeddable":true,"href":"https:\/\/wpsites.ucalgary.ca\/dbsec2021\/wp-json\/wp\/v2\/comments?post=282"}],"version-history":[{"count":17,"href":"https:\/\/wpsites.ucalgary.ca\/dbsec2021\/wp-json\/wp\/v2\/pages\/282\/revisions"}],"predecessor-version":[{"id":320,"href":"https:\/\/wpsites.ucalgary.ca\/dbsec2021\/wp-json\/wp\/v2\/pages\/282\/revisions\/320"}],"wp:attachment":[{"href":"https:\/\/wpsites.ucalgary.ca\/dbsec2021\/wp-json\/wp\/v2\/media?parent=282"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}