TRUST Autumn 2012 Conference: November 14-15, 2012
|
The Autumn 2012 TRUST Conference will be held |
This event provides attendees with an opportunity to hear firsthand about the work of TRUST faculty and students-specifically activities that:
- Advance a leading-edge research agenda to improve the state-of-the art in cyber security and critical infrastructure protection;
- Develop robust education and diversity plans to teach the next generation of computer scientists, engineers, and social scientists; and
- Pursue knowledge transfer opportunities to transition TRUST results to end users within industry and the government.
Conference Program
Below is the conference program. This program represents the latest information available but is subject to change.
A PDF version of the conference program is available here.
Wednesday | November 14, 2012 | |
0845-0900 | Conference Welcome | |
0900-1000 | Keynote Address Connecting Privacy and Cybersecurity Research to U.S. Policy | |
Aaron Burstein (Policy Advisor, National Telecommunications and Information Administration) | ||
1000-1020 | Break | |
Session 1: Security of Cyber-Infrastructure I | ||
1020-1045 | On the Feasibility of Completely Wireless Datacenters | |
Ji-Yong Shin (Cornell University) | ||
1045-1110 | SENTINEL: Securing Database from Logic Flaws in Web Applications | |
Yuan Xue (Vanderbilt University) | ||
1110-1135 | ||
Ki Suh Lee (Cornell University) | ||
1135-1200 | Abstractions for Network Update | |
Mark Reitblatt (Cornell University) | ||
1200-1225 | Privilege Separation for HTML5 Applications | |
Devdatta Akhawe (University of California, Berkeley) | ||
1225-1330 | ||
Lunch | ||
Session 2: Trustworthy Health Information Systems | ||
1330-1355 | A Practical Approach to Achieve Private Medical Record Linkage in Light of Public Resources | |
Brad Malin (Vanderbilt University) | ||
1355-1420 | Modeling State Health Privacy Laws: HIPAA Compliance System | |
Ashley Tolbert (Auburn University) | ||
1420-1445 | Modeling Privacy Aware Health Information Exchange Systems | |
Andras Nadas (Vanderbilt University) | ||
1445-1510 | Declarative Privacy Policy: Finite Models and Attribute-Based Encryption | |
Ellick Chan (Stanford University) | ||
1510-1530 | Break | |
Session 3: Economics and Privacy I | ||
1530-1555 | Security Games with Market Insurance | |
Benjamin Johnson (University of California, Berkeley) | ||
1555-1620 | A Systems View of Security and Privacy in AMI Systems | |
Roy Dong (University of California, Berkeley) | ||
1620-1645 | Do Not Track: Multistakeholderism and Standardization | |
Nick Doty (University of California, Berkeley) | ||
1645-1715 | TRUST Poster Session Introductions | |
1730 | Reception / TRUST Poster Session | |
Thursday | November 15, 2012 | |
0800-0900 | Breakfast | |
0900-1000 | Keynote Address | |
Cybersecurity Legislation: Why You Have to Go and Make Things So Complicated? | ||
Eric Wenger (Policy Counsel, Microsoft) | ||
1000-1020 | Break | |
Session 4: Security of Cyber-Infrastructure II | ||
1020-1045 | Running Smart Grid Control Software on Cloud Computing Architectures | |
Ken Birman (Cornell University) | ||
1045-1110 | Science of Web Security and Third-Party Tracking | |
John Mitchell (Stanford University) | ||
1110-1135 | Automated Analysis of Election Audit Logs | |
Anne Edmundson (Cornell University) | ||
1135-1200 | A Forensic Investigation of an Xbox 360: Mapping Investigative Data using Open Source Tools | |
Ashley Podhradsky (Dakota State University/Drexel University) | ||
1200-1225 | Using Brain-Computer Interfaces to Analyze EEG Data for Safety Improvement | |
Hen Su Choi (Santa Monica College) | ||
1225-1330 | Lunch | |
Session 5: Economics and Privacy II | 1330-1355 | Pricing in Linear-Quadratic Dynamic Games |
Lillian Ratliff (University of California, Berkeley) | ||
1355-1420 | Formalizing and Enforcing Purpose Restrictions in Privacy Policies | |
Anupam Datta (Carnegie Mellon University) | ||
1420-1445 | Protecting Patients through Dynamic Network Analysis of Hospital Department Relationships | |
You Chen (Vanderbilt University) | ||
1445-1510 | An Experiment in Hiring Discrimination via Online Social Networks | |
Alessandro Acquisti (Carnegie Mellon University) | ||
Session 6: Education Initiatives | ||
1530-1555 | Using DETER for Research and Teaching | |
Anthony Joseph (University of California, Berkeley) | ||
1555-1620 | Tools and Learning Analytics for Modern Web-based Technical Education | |
Sherif Halawa (Stanford University) |
Additional Information
If you have any questions or need more information, please contact
Aimee Tabor, the TRUST Program Manager.