You are Welcome to Attend Keynote Speeches Specific to SpaCCS 2016 as in Part I.
You are also Welcome to Attend all Keynote Speeches Shared by Co-Located
APSCC 2016 & ISPEC 2016 Conferences as in Part II:
Keynote Speaker 2: Prof. Indrakshi Ray, Colorado State University, USA
Title: Attribute-Based Access Control Status and Directions
Keynote Speaker 3: Dr. Shui Yu, Deakin University, Australia
Title: Network Attack and Defence: State-of-Art, Challenges, and Opportunities
Detailed Information about Keynote Speeches
Abstract: Accountability implies that any entity should be held responsible for its own specific action or behavior so that the entity is part of larger chains of accountability. One of the goals of accountability is that once an event has transpired, the events that took place are traceable so that the causes can be determined afterward. The poor accountability provided by today's computers and networks wastes a great deal of money and effort. This is due to the simple fact that today's computing and network infrastructure was not built with accountability in mind. In this talk we introduce our previous work: accountable logging methodology called flow-net. We apply this methodology to many applications ranging from operating system design to computer networks.
Prof. Yang Xiao currently is a Professor of Department of Computer Science at the University of Alabama, Tuscaloosa, AL, USA. His current research interests include networking and computer/network security. He has published over 200 journal papers and over 200 conference papers. Dr. Xiao was a Voting Member of IEEE 802.11 Working Group from 2001 to 2004, involving IEEE 802.11 (WIFI) standardization work. He is a Fellow of IET. He currently serves as Editor-in-Chief for International Journal of Security and Networks, International Journal of Sensor Networks, and Journal of Communications. He had (s) been an Editorial Board or Associate Editor for 17 international journals. He served (s) as a Guest Editor for over 20 times for different international journals. Dr. Xiao has delivered over 30 keynote speeches at international conferences around the world and gave more than 60 invited talks at different international institutes.
Abstract: Attribute-based access control (ABAC) appears to be a promising direction for futuristic applications. ABAC encompasses almost existing access control models, including Identity-Based Access Control, Role-Based Access Control. In this talk, we will look at two ABAC research efforts, namely, eXtensible Access Control Markup Language (XACML) and NIST Next Generation Access Control (NGAC) and provide a detailed comparison. We will demonstrate how these approaches satisfy the needs of some applications, including policies in the health care sector. We will also provide pointers to the open problems and some directions for future research in ABAC.
Prof. Indrakshi Ray is a Professor in the Computer Science Department at Colorado State University. She has been a visiting faculty at Air Force Research Laboratory, Naval Research Laboratory, and at INRIA, Rocquencourt, France. She obtained her Ph.D. in Information Technology from George Mason University. Dr. Ray's research interests include security and privacy, database systems, and formal methods for software assurance. She is on the editorial board of IEEE Transactions on Dependable and Secure Computing and Computer Standards and Interfaces. She has been a guest editor of ACM Transactions of Information Systems Security and Journal of Digital Library. She was the Program Chair of ACM SACMAT 2006, Program Co-Chair for ICISS 2013, CSS 2013, IFIP DBSec 2003, and General Chair of SACMAT 2008.
Abstract: Cyberspace is now a critical battle ground for attacks and defences at personal and national level. However, cybersecurity is a mainly uncharted territory, and we have far more questions than answers from applications all the way to theories. In this talk, we firstly present the state-of-art of the field based on our own research and extensive study in cybersecurity. We present the problems and challenges that we are facing, and discuss the possible directions in the field.
Prof. Shui Yu is currently a Senior Lecturer of School of Information Technology, Deakin University. He is a member of Deakin University Academic Board (2015-2016), a Senior Member of IEEE, and a member of AAAS and ACM, the vice chair of Technical Subcommittee on Big Data Processing, Analytics, and Networking of IEEE Communication Society, and a member of IEEE Big Data Standardization Committee. Dr Yu's research interest includes Security and Privacy in Networking, Big Data, and Cyberspace, and mathematical modelling. He has published two monographs and edited two books, more than 150 technical papers, including top journals and top conferences, such as IEEE TPDS, IEEE TC, IEEE TIFS, IEEE TMC, IEEE TKDE, IEEE TETC, and IEEE INFOCOM. Dr Yu initiated the research field of networking for big data in 2013. His h-index is 22. Dr Yu actively serves his research communities in various roles. He is currently serving the editorial boards of IEEE Communications Surveys and Tutorials, IEEE Access, and a number of other international journals. He has served more than 70 international conferences as a member of organizing committee, such as publication chair for IEEE Globecom 2015, IEEE INFOCOM 2016 and 2017, TPC co-chair for IEEE BigDataService 2015, IEEE ATNAC 2014 and 2015.
More information of Dr Yu can be found at http://www.deakin.edu.au/~syu/
Keynote Speaker 1: Prof. Jie Wu, IEEE Fellow, Temple University, USA
Title: Algorithmic Crowdsourcing: Current State and Future Perspective
Keynote Speaker 2: Prof. Schahram Dustdar, IEEE Fellow, The TU Wien, Austria
Title: Services Computing - A Research Agenda for the Next 10 Years
Keynote Speaker 3: Dr. Hai Jin, Senior Member of IEEE
Professor at Huazhong University of Science and Technology, China
Title: Architecture Consideration for Big Data Processing
Keynote Speaker 5: Prof. David Naccache, ENS Paris, France
Title: Thrifty Zero-Knowledge: When Linear Programming Meets Cryptography
More keynote speeches will be available soon.
Detailed Information about Keynote Speeches
Abstract: This talk gives a survey of crowdsourcing applications, with a focus on algorithmic solutions. The recent search for Malaysia flight 370 is used first as a motivational example. Fundamental issues in crowdsourcing, in particular, incentive mechanisms for paid crowdsourcing, and algorithms and theory for crowdsourced problem-solving, are then reviewed. Several applications of algorithmic crowdsourcing applications are discussed in detail, with a focus on big data. The talk also discusses several on-going projects on crowdsourcing at Temple University.
Prof. Jie Wu is the Associate Vice Provost for International Affairs at Temple University, Philadelphia, USA. He also serves as the Chair and Laura H. Carnell professor in the Department of Computer and Information Sciences. Prior to joining Tempe University, he was a program director at the National Science Foundation and was a distinguished professor at Florida Atlantic University. His current research interests include mobile computing and wireless networks, routing protocols, cloud and green computing, network trust and security, and social network applications. Dr. Wu regularly publishes in scholarly journals, conference proceedings, and books. He serves on several editorial boards, including IEEE Transactions on Service Computing and the Journal of Parallel and Distributed Computing. Dr. Wu was general co-chair/chair for IEEE MASS 2006, IEEE IPDPS 2008, IEEE ICDCS 2013, and ACM MobiHoc 2014, as well as program co-chair for IEEE INFOCOM 2011 and CCF CNCC 2013. He was an IEEE Computer Society Distinguished Visitor, ACM Distinguished Speaker, and chair for the IEEE Technical Committee on Distributed Processing (TCDP). Dr. Wu is a CCF Distinguished Speaker and a Fellow of the IEEE. He is the recipient of the 2011 China Computer Federation (CCF) Overseas Outstanding Achievement Award.
Abstract: In this talk I will discuss challenges ahead in the field of Services Computing. I will explore the major obstacles that hinder the development and potential realization of Services Computing in the real world, propose research directions, and discuss a roadmap guiding advancement in Services Computing, Social computing, and the Internet of Things.
Prof. Schahram Dustdar is Full Professor of Computer Science and head of The Distributed Systems Group at the TU Wien, Austria. From 2004-2010 he was Honorary Professor of Information Systems at the Department of Computing Science at the University of Groningen (RuG), The Netherlands. He is an Associate Editor of IEEE Transactions on Services Computing, ACM Transactions on the Web, and ACM Transactions on Internet Technology and on the editorial board of IEEE Internet Computing and IEEE Computer. He is the Editor-in-Chief of Computing (Springer). Dustdar is recipient of the ACM Distinguished Scientist award (2009), the IBM Faculty Award (2012), a member of the Academia Europaea: The Academy of Europe, and an IEEE Fellow (2016).
Abstract: With emerging of big data, the processing speed for the data is one of the key issues for big data technology. One of the efficient way to handle the velocity of data is putting all the data in the memory. But traditional memory, DRAM, consumes a large amount of energy and cost to build a large memory system. In recent years, lots of non-volatile memory devices, such as phase change memory (PCM), are studied to be part of memory. We call these storage class memory (SCM). Combing traditional memory and SCM together to build a large hybrid memory space is becoming one of the energy-efficient way to extend the traditional in-memory computing system into a new level, to handle large quality of data in real time. In this talk, we will discuss this new in-memory computing system from different aspects and some challenges in this new system. We will also report some ongoing effort in China to build this hybrid memory-based in-memory computing system, and some latest advances in this area.
Dr. Hai Jin is a Cheung Kung Scholars Chair Professor of computer science and engineering at Huazhong University of Science and Technology (HUST) in China. Jin received his PhD in computer engineering from HUST in 1994. In 1996, he was awarded a German Academic Exchange Service fellowship to visit the Technical University of Chemnitz in Germany. Jin worked at The University of Hong Kong between 1998 and 2000, and as a visiting scholar at the University of Southern California between 1999 and 2000. He was awarded Excellent Youth Award from the National Science Foundation of China in 2001. Jin is the chief scientist of ChinaGrid, the largest grid computing project in China, and the chief scientists of National 973 Basic Research Program Project of Virtualization Technology of Computing System, and Cloud Security.Jin is a senior member of the IEEE and a member of the ACM. He has co-authored 15 books and published over 600 research papers. His research interests include computer architecture, virtualization technology, cluster computing and cloud computing, peer-to-peer computing, network storage, and network security.
Abstract: Many security protocols involve humans, not machines, as endpoints. The differences are critical: humans are not only computationally weaker than machines, they are naive, careless, and gullible. We present foundations, methods, and tool support for formalizing and reasoning about security protocols used by fallible humans. We provide case studies of authentication protocols that show how different protocol constructions and features differ in their effectiveness with respect to different kinds of human errors. This provides a starting point for a fine-grained classification of security protocols from a usable-security perspective.(Joint work with Sasa Radomirovic and Lara Schmid)
Prof. David Basin is a full professor of Computer Science at ETH Zurich. He received his Ph.D. in Computer Science from Cornell University in 1989 and his Habilitation in Computer Science from the University of Saarbrucken in 1996. From 1997-2002 he held the chair of Software Engineering at the University of Freiburg in Germany. His research areas are Information Security and Software Engineering. He is the founding director of the ZISC, the Zurich Information Security Center, which he led from 2003-2011. He is Editor-in-Chief of the ACM Transactions on Privacy and Security and of Springer-Verlag's book series on Information Security and Cryptography. He serves on various management and scientific advisory boards and has consulted extensively for IT companies and government organizations.
Abstract: We introduce "thrifty" zero-knowledge protocols, or TZK. These protocols are constructed by introducing a bias in the challenge sent by the prover. This bias is chosen so as to maximize the security versus effort trade-off. We illustrate the benefits of this approach on several well-known zero-knowledge protocols.
Prof. David Naccache heads the ENS Information Security Group. His research areas are code security, forensics, the automated and the manual detection of vulnerabilities. Before joining ENS Paris (PSL) he was a professor during 10 years at UP2 (Sorbonne Universit¨¦s). He previously worked for 15 years for Gemplus (now Gemalto), Philips (now Oberthur) and Thomson (now Technicolor). He studied at UP13 (BSc), UP6 (MSc), IMAC (Eng), TPT (PhD), UP7 (HDR), IHEDN and ICP (STB underway). He is a forensic expert by several courts, a member of OSCP and the incumbant of the Law and IT forensics chair at EOGN.