-> CISIS 2009 conference

Keynotes / Invited Talks

This year's keynotes speaker will be Elisa Bertino (Purdue University),  Sushil Jajodia (George Mason University Fairfax) and Eiji Okamoto (Tsukuba University).
This year's invited talk is held by
Solange Ghernaouti-Helie (Université de Lausanne).

Keynotes 

Keynote speaker

Prof. Elisa Bertino (Purdue University)

Digital Identity Protection - Concepts and Issues 

 

Digital identity management (DIM) has emerged as a critical foundation for supporting successful interaction in today's globally interconnected society.
It is crucial not only for the conduct of business and government but also for a large and growing body of electronic or online social interactions.
Digital identity management is usually coupled with the notion of federation.
The goal of federations is to provide users with protected environments to federate identities by the proper management of identity attributes.
Federations provide a controlled method by which federation members can provide more integrated and complete services to a qualified group of individuals within certain sets of business transactions. By controlling the scope of access to participating sites, and by enabling secure, cross-domain transmission of user's personal information, federations can make the perpetration of identity frauds more difficult, as well as reduce their frequency, and their potential impact. In this talk we will first discuss basic digital identity concepts and requirements towards DIM solutions and we will overview relevant initiatives currently undergoing in academia and industry.  We will then focus on the problem of identity theft and discuss an initial solution to the problem of establishing and protecting digital identity.

 

Keynote

Prof. Sushil Jajodia (George Mason University)

Topological Analysis of Network Attack Vulnerability

 

This talk will discuss issues and methods for survivability of systems under malicious attacks. To protect from such attacks, it is necessary to take steps to prevent attacks from succeeding. At the same time, it is important to recognize that not all attacks can be averted at the outset; attacks that are successful to some degree must be recognized as unavoidable and comprehensive support for identifying and responding to attacks is required.

In my talk, I will describe the recent research on attack graphs that represent known attack sequences attackers can use to penetrate computer networks.  I will show how  attack graphs can be used  to compute actual sets of hardening measures  that guarantee the safety of given critical resources.  Attack graphs can also be used to correlate received alerts, hypothesize missing alerts, and predict future alerts, all at the same time. Thus, they offer a promising solution for administrators to monitor and predict the progress of an intrusion, and take appropriate countermeasures in a timely manner.

 

Keynote speaker

Prof. Eiji Okamoto (Tsukuba University)

Pairing based cryptography - theory, implementations and applications

 


Pairing based cryptography is a new and important research area in security. It has a significant property, bilinearity, and using this, a lot of new protocols are proposed recently. In this talk, pairing function is introduced, and then its fast computation algorithm and implementation on hardware and software are shown. Finally its applications to cryptography are introduced.

 

Invited Talk


Prof. Solange Ghernaouti-Hélie (University of Lausanne)

Integrative security approach as a key success factor of dependability

 

To raise the level of dependability of information and communication infrastructures, a comprehensive and integrated approach to ICT security is necessary. At the crossroads of technological, legal, sociological, economic, and political fields, information and communication security is interdisciplinary by nature. The effectiveness of ICT security relies upon how a large range of strategic and operational requirements is addressed. Major issues related to the necessity for, and the complexity of, an integrated security approach are discussed from both global and specific local perspectives.