Team for Research in
Ubiquitous Secure Technology

TRUST Autumn 2012 Conference: November 14-15, 2012

Trust Logo

The Autumn 2012 TRUST Conference will be held
November 14-15, 2012 at the University of California, Washington Center (UCDC).

This event provides attendees with an opportunity to hear firsthand about the work of TRUST faculty and students-specifically activities that:

  1. Advance a leading-edge research agenda to improve the state-of-the art in cyber security and critical infrastructure protection;
  2. Develop robust education and diversity plans to teach the next generation of computer scientists, engineers, and social scientists; and
  3. Pursue knowledge transfer opportunities to transition TRUST results to end users within industry and the government.

Conference Program

Below is the conference program. This program represents the latest information available but is subject to change.

A PDF version of the conference program is available here.

Wednesday November 14, 2012
0845-0900 Conference Welcome
0900-1000 Keynote Address Connecting Privacy and Cybersecurity Research to U.S. Policy
Aaron Burstein (Policy Advisor, National Telecommunications and Information Administration)
1000-1020 Break
Session 1: Security of Cyber-Infrastructure I
1020-1045 On the Feasibility of Completely Wireless Datacenters
Ji-Yong Shin (Cornell University)
1045-1110 SENTINEL: Securing Database from Logic Flaws in Web Applications
Yuan Xue (Vanderbilt University)
1110-1135
Ki Suh Lee (Cornell University)
1135-1200 Abstractions for Network Update
Mark Reitblatt (Cornell University)
1200-1225 Privilege Separation for HTML5 Applications
Devdatta Akhawe (University of California, Berkeley)
1225-1330
Lunch
Session 2: Trustworthy Health Information Systems
1330-1355 A Practical Approach to Achieve Private Medical Record Linkage in Light of Public Resources
Brad Malin (Vanderbilt University)
1355-1420 Modeling State Health Privacy Laws: HIPAA Compliance System
Ashley Tolbert (Auburn University)
1420-1445 Modeling Privacy Aware Health Information Exchange Systems
Andras Nadas (Vanderbilt University)
1445-1510 Declarative Privacy Policy: Finite Models and Attribute-Based Encryption
Ellick Chan (Stanford University)
1510-1530 Break
Session 3: Economics and Privacy I
1530-1555 Security Games with Market Insurance
Benjamin Johnson (University of California, Berkeley)
1555-1620 A Systems View of Security and Privacy in AMI Systems
Roy Dong (University of California, Berkeley)
1620-1645 Do Not Track: Multistakeholderism and Standardization
Nick Doty (University of California, Berkeley)
1645-1715 TRUST Poster Session Introductions
1730 Reception / TRUST Poster Session
Thursday November 15, 2012
0800-0900 Breakfast
0900-1000 Keynote Address
Cybersecurity Legislation: Why You Have to Go and Make Things So Complicated?
Eric Wenger (Policy Counsel, Microsoft)
1000-1020 Break
Session 4: Security of Cyber-Infrastructure II
1020-1045 Running Smart Grid Control Software on Cloud Computing Architectures
Ken Birman (Cornell University)
1045-1110 Science of Web Security and Third-Party Tracking
John Mitchell (Stanford University)
1110-1135 Automated Analysis of Election Audit Logs
Anne Edmundson (Cornell University)
1135-1200 A Forensic Investigation of an Xbox 360: Mapping Investigative Data using Open Source Tools
Ashley Podhradsky (Dakota State University/Drexel University)
1200-1225 Using Brain-Computer Interfaces to Analyze EEG Data for Safety Improvement
Hen Su Choi (Santa Monica College)
1225-1330 Lunch
Session 5: Economics and Privacy II
1330-1355 Pricing in Linear-Quadratic Dynamic Games
Lillian Ratliff (University of California, Berkeley)
1355-1420 Formalizing and Enforcing Purpose Restrictions in Privacy Policies
Anupam Datta (Carnegie Mellon University)
1420-1445 Protecting Patients through Dynamic Network Analysis of Hospital Department Relationships
You Chen (Vanderbilt University)
1445-1510 An Experiment in Hiring Discrimination via Online Social Networks
Alessandro Acquisti (Carnegie Mellon University)
Session 6: Education Initiatives
1530-1555 Using DETER for Research and Teaching
Anthony Joseph (University of California, Berkeley)
1555-1620 Tools and Learning Analytics for Modern Web-based Technical Education
Sherif Halawa (Stanford University)

Additional Information

If you have any questions or need more information, please contact Aimee Tabor, the TRUST Program Manager.