6:30 - 9pm
Malkin Penthouse
Reception
Thursday June 2
7:30-8: Breakfast
8 - 8:30: Greeting
8:15- 10: Investment in Security (Chair: Larry Gordon)
10 - 10:30: Coffee
10:30 – 12: Responses to Security Failure (Chair: Stuart Schechter)
12:00 - 2:00:
Lunch at Fire & Ice (http://www.fire-ice.com/experience/experience.html)
2:- 3:30: DRM & Spam (Chair: Ross Anderson)
3:30 - 4: Tea
4:00 - 5: 30: Incentive Modeling (Chair: Rahul
Telang )
5:30 Dinner: Legal Seafood (included in registration)
7:30 Rump Session (Chair: Andrew Odlyzko)
Friday June 3
7:30 - 8: 30: Breakfast
8:30 - 10:00:
I. Insurance (Chair: Marty Loeb )
10 - 10:30: Coffee
10:30 - 12:
II. Experiments & Field Studies(Chair: Alessandro Acquisti )
12:00 - 2:00: Buffet Lunch at KSG
2:00 - 3:30:
III. Privacy(Chair: Jean Camp)
- Zhulei Tang, Yu (Jeffrey) Hu, Michael D. Smith, "Protecting
Online Privacy: Self-Regulation, Mandatory Standards, or Caveat Emptor" (slides)
- Alessandro Acquisti, and Jens Grossklags, "Uncertainty,
Ambiguity and Privacy" (slides)
- Rachel Greenstadt and Michael D. Smith, "Protecting
Personal Information: Obstacles and Directions (slides)
- David Baumer, Julia Earp, and J.C. Poindexter, "Quantifying
Privacy Choices with Experimental Economics" (slides)
3:30 - 4:00: Tea
4:00 - 5:30:
IV. Vulnerabilities(Chair: Huseyin Cavusoglu)
5:30 – 6:00: Business meeting to instantiate
new Not For Profit.
Rump (Authors, please submit revised versions as extended abstracts of up to 3 pages.
Format information can be found at http://www.cs.indiana.edu/icfp04/acm.html)
- Adam Shostack, "Avoiding Liability: An
Alternative Route to More Secure Products"
- Sabah S. Al-Fedaghi, "Privacy as a Base
for Confidentiality" (slides)
- Ritesh Kumar Tiwari, and Kamalakar Karlapalem, "Cost
Tradeoffs For Information Security Assurance"
- Pramod A. Jamkhedkar, and Gregory L. Heileman, "The
Role of Architecture in DRM Vendor Economics"
- Paul Judge, Dmitri Alperovitch, and Weilai Yang, "Understanding
and Reversing the Profit Model of Spam
- Pramod A. Jamkhedkar, and Gregory L. Heileman,"The
Role of Architecture in DRM Vendor Economics"
- Marco Cremonini, and Patrizia Martini, "Evaluating
Information Security Investments from Attackers Perspective:
the Return-On-Attack (ROA)" (slides)
- George Danezis, Stephen Lewis and Ross Anderson,
"How much is location privacy worth?" (slides)
-
Brent Rowe and Michael Gallaher, "Could
IPv6 Improve Network Security? And, If So, at What Cost?" (slides)
- Fariborz Farahmand, Shamkant B. Navathe, Gunter P. Sharp, Philip
H. Enslow,"Assessing Damages of Information
Security Incidents and Selecting Control Measures, a Case Study Approach" (slides)
- Peter E. Sand, Director of Privacy Technology, "The Privacy Value"
- Choong Hee Lee and Junseok Hwang, " Private Information Shielding Service for Overcoming Privacy Risk in Recommender System
" (slides)
- Christopher E. Everett, " Bridging the Gap Between Computer Security and Legal
Requirements"
PLEASE NOTE: Thursday, June 2 and Friday, June 3, 2005 are
extremely busy days around Harvard Square. Harvard and MIT are both
holding reunions and commencement ceremonies on and near those dates.
Please make your reservations at one of the nearby hotals as soon as
possible.
|
|