****Registration Deadline June 30, 2004************
*************************************************
     
DIMACS Workshop on Usable Privacy and Security Software
          
     July 7 - 8, 2004
     DIMACS Center, Rutgers University, Piscataway, NJ

Organizers: 

     Lorrie Cranor, Chair, AT&T, [EMAIL PROTECTED] 
     Mark Ackerman, University of Michigan, [EMAIL PROTECTED] 
     Fabian Monrose, Johns Hopkins University, [EMAIL PROTECTED] 
     Andrew Patrick, NRC Canada, [EMAIL PROTECTED] 
     Norman Sadeh, Carnegie Mellon University, [EMAIL PROTECTED] 

Presented under the auspices of the Special Focus on Communication
Security and Information Privacy.

    ************************************************

This workshop and working group is intended to bring together security
and privacy experts with human-computer interaction experts to discuss
approaches to developing more usable privacy and security
software. The workshop sessions on July 7 and July 8 will include
invited talks and discussion. July 9 will feature a "working group" of
invited participants who will spend the day identifying important
problems, discussing some of the research issues raised during the
workshop in more depth, and brainstorming about approaches to future
research, collaboration, and more user-centered design of security and
privacy software.

**************************************************************
Participation:

Participation in the workshop is open to anyone who registers (no
submission necessary).

**************************************************************
Program:

Wednesday, July 7, 2004

 8:15 -  8:50  Breakfast and Registration - CoRE Bldg., 4th floor

 8:50 -  9:00  Welcome and Opening Remarks
               Fred Roberts, DIMACS Director

 9:00 -  9:15  Opening Session
               Welcome: Lorrie Cranor, Carnegie Mellon University

 9:15 - 11:30  CHALLENGES, APPROACHES, AND MENTAL MODELS 
               Moderator: Lorrie Cranor

               Usable Security: Beyond the Interface
               Angela Sasse, University College London

               HCI Issues in Privacy
               Mark Ackerman, University of Michigan

               Security as Experience and Practice: Supporting Everyday Security
               Paul Dourish, UC Irvine

               Best Practices for Usable Security In Desktop Software
               Simson Garfinkel, MIT 

               Short Talk: A Flock of Birds, Safely Staged
               Scott Flinn, National Research Council of Canada

11:30 - 12:00  BREAK

12:00 - 12:45  Keynote:  Privacy and Security: Putting People First
               Elizabeth Mynatt, Georgia Institute of Technology

12:45 - 1:45   LUNCH

 1:45 - 2:30   Keynote: Human-Scale Security
               Matt Blaze, University of Pennsylvania

 2:30 - 3:00   BREAK

 3:00 - 5:30   AUTHENTICATION 
               Moderator: Andrew Patrick

               Some Practical Guidance for Improved Password Usability
               Mike Just, Treasury Board of Canada

               Fingerprint authentication: The user experience
               Lynne Coventry, NCR

               Authentication for Humans
               Rachna Dhamija, UC Berkeley

               On user choice in graphical password schemes
               Fabian Monrose, Johns Hopkins University

               Short talk: Secure Web Authentication with Mobile Phones
               Min Wu, MIT

               Short talk: Toward Usable Security
               Dirk Balfanz, Palo Alto Research Center

 5:30          Reception

 6:15          Dinner

Thursday, July 8, 2004

 8:30 -  9:00  Breakfast and Registration
 
 9:00 - 10:30  PRIVACY, ANONYMITY, AND ENCRYPTION TOOLS (part I)
               Moderator: Lorrie Cranor

               Cryptography and Information Sharing in Civil Society
               Marc Levine, Benetech

               Anonymity loves company: Usability as a security parameter
               Roger Dingledine, The Free Haven Project

               Making Security Visible
               Alma Whitten, Google

               Short talk: Techniques for Visual Feedback of Security State
               Tara Whalen, Dalhousie University

10:30 - 11:00  BREAK

11:00 - 12:30  PRIVACY, ANONYMITY, AND ENCRYPTION TOOLS (part II)
               Moderator: Norman Sadeh

               Privacy Analysis for the Casual User Through Bugnosis
               David Martin, University of Massachusetts Lowell

               Protecting privacy in software agents: Lessons from the PISA project
               Andrew Patrick, National Research Council, Canada

               Architectural issues in distributed, privacy-protecting 
               social networking
               Lenny Foner, MIT

               Short talk: Privacy in Instant Messaging
               Sameer Patil, University of California, Irvine

12:45 -  1:45  LUNCH

 1:45 -  3:15  UBIQUITOUS COMPUTING
               Moderator: Mark Ackerman

               Knowing What You're Doing: A Design Goal for Usable Ubicomp Privacy
               Scott Lederer, UC Berkeley

               Privacy Challenges in Ubiquitous Computing
               Marc Langheinrich, ETH Zurich

               Semantic Web Technologies to Reconcile Privacy and Context Awareness
               Norman Sadeh, Carnegie Mellon University

 3:15 -  3:45  BREAK

 3:45 -  5:30  ADMINISTRATION AND ACCESS CONTROL
               Moderator: Fabian Monrose

               Better Tools for Security Administration:
               Enhancing the Human-Computer Interface with Visualization
               Bill Yurcik, National Center for Supercomputing Applications

               Approaches for Designing Flexible Mandatory System Security Policies
               Trent Jaeger, IBM

               Useless Metaphors: Why Specifying Policy is So Hard?
               Patrick McDaniel, AT&T Labs-Research

               Chameleon: Towards Usable RBAC
               Chris Long, Carnegie Mellon University


*********************************************************************
Registration:

Pre-registration deadline: June 30, 2004

Please see website for complete registration information:
http://dimacs.rutgers.edu/Workshops/Tools/

*********************************************************************

Information on participation, registration, accomodations, and travel 
can be found at:

http://dimacs.rutgers.edu/Workshops/Tools/

   **PLEASE BE SURE TO PRE-REGISTER EARLY**

********************************************************************



---------------------------------------------------------------------
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to [EMAIL PROTECTED]

Reply via email to