Invited Talks etc.


Home
Publications
Most Cited Papers
Guide to Papers
Patents
Grants
PhD's Awarded
Invited Talks etc.
Teaching
Vitae etc.
Contact Me

    2013: 10

  1. The Science, Engineering, and Business of Cyber Security (pptx) (pdf)
    Keynote talk at ACM CCS Conference, Berlin, Germany, November 6 2013.
  2. The Science, Engineering, and Business of Cyber Security (pptx) (pdf)
    Keynote talk at UTSA College of Science Research Conference, San Antonio, Oct 18, 2013.
  3. The Future of Access Control: Attributes, Automation and Adaptation (pptx) (pdf) (abstract)
    Keynote talk at 14th IEEE Conference on Information Reuse and Integration (IRI), San Francisco, Aug 14-16, 2013.
  4. The Future of Access Control: Attributes, Automation and Adaptation (pptx) (pdf) (abstract)
    Keynote talk at 7th IEEE Conference on Software Security and Reliability (SERE), June 18-20, 2013, Gaithersburg, Maryland.
  5. Institute for Cyber Security (pptx) (pdf)
    Private presentation, June 18, 2013, Arlington, Virginia.
  6. Program Chairs' Opening Statement (pptx) (pdf)
    Program Chairs' Opening Statement at 7th International Conference on Network and System Security (NSS 2013), June 3-4, 2013, Madrid, Spain.
  7. Authorization and Trust in the Cloud (pptx) (pdf) (abstract)
    Invited talk at NSF-STDF US-Egypt Cyber Security Workshop, May 27-30, 2013, Cairo, Egypt.
  8. Panel on Data Usage Management: Technology or Regulation? (pptx) (pdf)
    Statement at Panel on Data Usage Management: Technology or Regulation?, at 4th International Workshop on Data Usage Management, San Francisco, California, May 23, 2013 (colocated with IEEE Symposium on Security and Privacy).
  9. The Future of Access Control: Attributes, Automation and Adaptation (pptx) (pdf)
    Invited talk at Security and Privacy Symposium, IIT Kanpur, Kanpur, India, Feb 28-Mar 2, 2013.
  10. Panel on Security and Privacy in Human-Centric Computing and Big Data Management (pptx) (pdf)
    Statement at Panel on Security and Privacy in Human-Centric Computing and Big Data Management, at 3rd ACM Conference on Data and Applications Security (CODASPY), February 18-20, 2013, San Antonio, Texas.
  11. 2012: 14

  12. The Future of Access Control: Attributes, Automation and Adaptation (pptx) (pdf) (abstract)
    Keynote talk at 6th international Conference on Network and System Security, Wuyishan, China, Nov 21-23, 2012.
  13. Challenges of Cyber Security Education at the Graduate Level (pptx) (pdf)
    Presentation at Texas Tech University NSF-SFS Workshop on Educational Initiatives in Cybersecurity for Critical Infrastructure, November 8-9, 2012, Lubbock, Texas.
  14. Group-Centric Secure Information Sharing: A Lattice Interpretation (pptx) (pdf)
    Presentation at MURI PI's AISL-Presidio joint meeting, Sept. 14, 2012, Stanford University, Palo Alto, California.
  15. ICS Research Projects (pptx) (pdf)
    Talk at IIIT, Delhi, India, August 30, 2012.
  16. The Authorization Leap from Rights to Attributes: Maturation or Chaos? (pptx) (pdf)
    Invited talk at 1st International Conference on Security of Internet of Things, Amrita University, Amritapuri, Kerala, India, August 17-19, 2012.
  17. IRI Principles to Address The Big Data Problem (pptx) (pdf)
    Statement at Panel on Using Information Re-Use and Integration Principles in Big Data at 13th IEEE Conference on Information Reuse and Integration (IRI), Las Vegas, Nevada, August 8-10, 2012.
  18. The Authorization Leap from Rights to Attributes: Maturation or Chaos? (pptx) (pdf)
    Keynote talk at 10th IEEE Conference on Privacy, Security and Trust (PST), Paris, France, July 16-18, 2012.
  19. The Authorization Leap from Rights to Attributes: Maturation or Chaos? (pptx) (pdf) (abstract)
    Keynote talk at 17th ACM Symposium on Access Control Models and Technologies (SACMAT), Newark, NJ, June 20-22, 2012.
  20. Cyber Security Major R&D Challenges (pptx) (pdf)
    Statement at Cyber Security Research Institute (CSRI), Cyber Security R&D Workshop, Arlington, Virginia, April 19-20, 2012. Presented by Ram Krishnan.
  21. Open Discussion PSOSM12 (pptx) (pdf)
    Statement at Open Discussion Session at the Workshop on Privacy and Security in Online Social Networks (PSOSM), held in conjunction with WWW 2012, Lyon, France, April 17th, 2012.
  22. Grand Challenges in Data Usage Control (pptx) (pdf)
    Keynote talk at the Workshop on Data Usage Management on the Web (DUMW), held in conjunction with WWW 2012, Lyon, France, April 16th, 2012.
  23. The Future of Cyber Security (pptx) (pdf)
    Talk in UTSA ECE Seminar Series, San Antonio, TX, April 6, 2012.
  24. Group-Centric Secure Information Sharing (pptx) (pdf)
    Keynote Talk at 1st Greater Kansas Area Security Workshop (KanSec), Kansas State University (KSU), Manhattan, KS, March 30, 2012.
  25. The Data and Application Security and Privacy (DASPY) Challenge (pptx) (pdf)
    Talk at Kansas State University (KSU), Manhattan, KS, March 29, 2012.

    2011: 9

  26. Grand Challenges in Authorization Systems (pptx) (pdf)
    Talk at Texas A&M University (TAMU), College Station, TX, November 14, 2011.
  27. The Data and Application Security and Privacy (DASPY) Challenge (pptx) (pdf)
    Talk at Texas A&M International University (TAMIU), Laredo, TX, November 11, 2011.
  28. The Data and Application Security and Privacy (DASPY) Challenge (pptx) (pdf)
    Triangle Computer Science Distinguished Lecturer Series, Raleigh, NC, October 31, 2011.
  29. Cyber Security Grand Challenges and Prognosis (pptx) (pdf)
    Talk at UTSA College of Science Research Conference, UTSA, San Antonio, TX, September 30, 2011.
  30. Challenges of Cyber Security Education at the Graduate Level (pptx) (pdf)
    Talk at University Partners Cyber Open House and Workshop, Sandia National Laboratories, Albuquerque, NM, July 25-27, 2011.
  31. The Future of Cyber Security (pptx) (pdf)
    Keynote Talk at 6th IEEE International Conference on Systems of Systems Engineering (SOSE), Albuquerque, NM, June 27-30, 2011.
  32. The Future of Cyber Security (ppt) (pdf)
    Talk at Tsinghua University, Beijing, China, May 10, 2011.
  33. The Challenge of Data and Application Security and Privacy (DASPY) (ppt) (pdf)
    Talk at Chinese University of Hong Kong (CUHK), Department of Information Engineering, Hong Kong, March 23, 2011.
  34. What is the Game in Cyber Security? (pptx) (pdf)
    Talk at Government-University-Industry Research Roundtable (GUIRR) Meeting on Cybersecurity in the Coming Decade: Using Security to Support the Value of Intellectual Property, Washington, DC, February 9, 2011. Meeting Summary

    2010: 12

  35. Panel on Cloud Security and Privacy: What is new and What needs to be done? (pptx) (pdf)
    Talk at 2nd IEEE International Conference on Cloud Computing (CloudCom 2010), Plenary Panel, Dec. 3, 2010, University Place Hotel and Conference Center, IUPUI, Indianapolis.
  36. Group-Centric Models for Secure and Agile Information Sharing (ppt) (pdf)
    Presentation at MURI PI's AISL-Presidio joint meeting, Oct. 15, 2010, University of Maryland Baltimore County.
  37. Privacy-Enhancing Models and Mechanisms for Securing Provenance and its Use (ppt) (pdf)
    Presentation at NSF, Arlington, VA, October 14, 2010.
  38. Laws of Cyber Security (ppt) (pdf)
    Talk at First International Workshop on Scientific Analysis and Policy Support for Cyber Security (SA&PS4CS'10), St. Petersburg, Russia, September 11, 2010.
  39. New Trends and Challenges in Computer Network Security (ppt) (pdf)
    Panel at 5th International Conference, on Mathematical Methods, Models, and Architectures for Computer Network Security, MMM-ACNS 2010, St. Petersburg, Russia, September 10, 2010.
  40. Security Models: Past, Present and Future (ppt) (pdf)
    Guest lecture at UTSA in Prof. Shouhuai Xu's CS 6393 AT: Cyber Security course, August 31, 2010.
  41. Security Models: Past, Present and Future (ppt) (pdf)
    Invited lecture at Information Security Summer School (ISSS), July 12-23, 2010, National Chiao Tung University, Hsinchu, Taiwan, (this lecture half day on July 20th).
  42. Solving the Access Control Puzzle: Finding the Pieces and Putting Them Together (ppt) (pdf)
    Talk at SACMAT 2010 Panel, Pittsburg, Pennsylvania, June 9-11, 2010.
  43. Trust Evidence in Heterogeneous Environments: Towards a Research Agenda (ppt) (pdf)
    Talk at Intel Trust Workshop, Santa Clara, California, May 19-20, 2010.
  44. Group-Centric Models for Secure and Agile Information Sharing (ppt)
    Talk at Dagstuhl Seminar on Distributed Usage Control, Schloss Dagstuhl, Germany, April 7-9, 2010.
  45. The Future of Cyber Security (ppt) (pdf)
    Invited talk at inauguration of Accenture's new Cyber Security Center, San Antonio, Texas, February 23, 2010.
  46. Speculations on the Future of Cyber Security in 2025 (ppt) (pdf)
    Invited talk at San Antonio Defense Technology Cluster Luncheon, San Antonio, Texas, January 7, 2010.
  47. 2009: 14

  48. Speculations on the Future of Cyber Security in 2025 (ppt) (pdf)
    Invited talk at AFCEA ArkLaTex Chapter General Membership Luncheon, Shreveport, Louisiana, November 17, 2009. Announcement.
  49. Cyber Security: What You Need to Know (ppt) (pdf)
    UTSA's Computer Security Awareness Month Lectures, UTSA Main Campus, San Antonio, Texas, October 30, 2009.
  50. Purpose-Centric Secure Information Sharing (ppt) (pdf)
    TIUPAM: A Framework for Trustworthiness-centric Information Sharing (ppt) (pdf)
    Presentations at MURI PI's AISL-Presidio joint meeting, Sept. 17-18, 2009, Stanford University.
  51. Application-Centric Security: UCON, PEI and g-SIS (ppt) (pdf)
    Presentation at NSF/Microsoft Workshop on Confidential Data Collection for Innovation Analysis, Seattle, Washington, September 9-10, 2009.
  52. Security and the Cloud: Cloud Trust Brokers (ppt) (pdf)
    Invited lecture at IN-Q-TEL Technology Focus Day: Cloud and Distributed Computing, Arlington, Virginia, August 27, 2009. Agenda.
  53. Cyber Security: Past, Present and Future (ppt) (pdf)
    Presentation at UTSA College of Science Research Conference, August 7, 2009.
  54. Application-Centric Security Models (ppt) (pdf)
    Invited lecture at Shanghai Jiao Tong University, Shanghai, China, July 18, 2009.
    Invited lecture at East China Normal University, Shanghai, China, July 17, 2009.
  55. Security Models: Past, Present and Future (ppt) (pdf)
    Invited lecture at Summer School on Parallel and Distributed Computing at Huazhong University of Science and Technology (HUST), Wuhan, China, July 1-21, 2009 (this lecture all day on July 15).
  56. Application-Centric Security Models (ppt) (pdf)
    Webinar Lecture for BAE Systems, June 16, 2009.
  57. The PEI Framework for Application-Centric Security
    Invited lecture at 1st International Workshop on Security and Communication Networks (IWSCN), Trondheim, Norway, May 20-22, 2009.
  58. Access Control
    Tutorial at the 1st International Workshop on Security and Communication Networks (IWSCN), Trondheim, Norway, May 20-22, 2009.
  59. The PEI + UCON Framework for Application Security
    Presentation at the NSF Workshop on Data and Application Security, February 19-20, 2009, Arlington, Virginia.
  60. A Perspective on Usage Control and its Future
    Invited lecture at Norwegian University of Science and Technology, January 28, 2009, Trondheim, Norway.
  61. Industry-Academia Research Synergy: Fantasy or Reality?
    Invited lecture at Intuit-eBay Security Confabulation, January 21, 2009, San Jose, California.

    2008: 13

  62. Group-Centric Information Sharing
    Keynote at 4th ICST-Create-Net International Conference on Collaborative Computing: Networking, Applications and Worksharing, Orlando, Florida, Nov. 14, 2008.
    Abstract
  63. Research Opportunities at the Institute for Cyber Security
    Guest lecture at CS 7123 Research Seminar for Doctoral Students, UTSA, Nov. 5, 2008.
  64. Formal Models for Assured Information Sharing
    Presentation at MURI kick-off meeting, Sept. 12, 2008, University of Maryland at Baltimore County.
  65. The ASCAA Principles Applied to Usage Control OR A Perspective on Usage Control and its Future
    Invited lecture at Zurich Information Security Center (ZISC) Workshop on Advanced Concepts of Access and Usage Control, Sept. 4-5, 2008, Zurich, Switzerland.
  66. Trusted Computing Models
    Keynote lecture at 2nd IEEE International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing (SUTC), June 11-13, 2008, Taichung, Taiwan.
  67. The ASCAA Principles for Next-Generation Role-Based Access Control
    Invited lecture at National Chiao Tung University, Hsinchu, Taiwan, June 11, 2008.
  68. The ASCAA Principles for Access Control Interpreted for Collaboration Systems
    Invited lecture at Workshop on Collaboration and Security (COLSEC) held at the 2008 International Symposium on Collaborative Technologies and Systems (CTS), Irvine, California, May 19-23, 2008.
  69. Access Control and Semantic Web Technologies
    Invited lecture at Secure Semantic Web Workshop held at the 24th International Conference on Data Engineering (ICDE), Cancun, México, April 7-12, 2008.
  70. The ASCAA Principles for Next-Generation Role-Based Access Control
    Keynote lecture at 3rd IEEE International Conference on Availability, Reliability and Security (ARES), Barcelona, Spain, March 4-7, 2008.
  71. The Secure Information Sharing Problem and Solution Approaches
    Invited lecture, University of Nebraska at Omaha, Department of Computer Science, Omaha, Nebraska, Feb. 15, 2008.
  72. Authentication: The Problem That Will Not Go Away
    Invited lecture at Office of Comptroller of the Currency, Western District, Examiners Conference, Denver, Colorado, Feb. 13, 2008.
  73. The Secure Information Sharing Problem and Solution Approaches
    Invited lecture, IIT Delhi, Department of Computer Science, New Delhi, India, Feb. 5, 2008.
  74. The Future: Evolution of the Technology
    Invited lecture at TriCipher Customer Appreciation Forum, Los Gatos, California, Jan. 17-18, 2008.
  75. 2007: 2

  76. The Institute for Cyber Security and its Research Agenda and Sandhu's Laws of Cyber Security
    Guest lecture at CS 7123 Research Seminar for Doctoral Students, UTSA, Nov. 21, 2007.
  77. Sandhu's Laws of Cyber Security
    Invited lecture at TriCipher Customer Appreciation Forum, St. Helena, California, Jan. 18-19, 2007.
  78. 2006: 5

  79. Information Assurance:A Personal Perspective (ppt) (pdf)
    Invited lecture at University of Texas at San Antonio, Texas, Oct. 30, 2006.
  80. The Secure Information Sharing Problem and Solution Approaches
    Distinguished lecture at University of Illinois at Chicago, Oct. 12, 2006.
  81. The Secure Information Sharing Problem and Solution Approaches
    Invited seminar at Center for Education and Research in Information Assurance and Security (CERIAS), Purdue University, West Lafayette, Indiana, Sept. 27, 2006.
  82. Digital Signature Usability
    Panel on Digital Signatures at 5th Annual PKI Research and Development Workshop, NIST, Gaithersburg, MD, April 4-6, 2006.
  83. Secure Information Sharing Enabled by Trusted Computing and PEI Models
    Keynote lecture at 1st ACM Symposium on Information, Computer, and Communication Security (AsiaCCS), Taipei, Taiwan, March 21-24, 2006.
  84. 2005: 1

  85. Securing Cyberspace: The OM-AM, RBAC and PKI Roadmap
    Invited lecture State University of New York, Stony Brook, May 5, 2005.
  86. 2004: 10

  87. Cyber-Identity, Authority and Trust in an Uncertain World
    Keynote lecture at 6th Brazilian Symposium on Computer and Information Security (SSI), November 9-12, 2004.
  88. Role-Based Access Control
    Tutorial at 6th Brazilian Symposium on Computer and Information Security (SSI), November 9-12, 2004.
  89. Cyber-Identity, Authority and Trust in an Uncertain World
    Distinguished lecture at Arizona State University, Tempe, Arizona, Oct. 22, 2004.
  90. A Perspective on Graphs and Access Control Models
    Keynote lecture at 2nd International Conference on Graph Transformation (ICGT), Rome, Italy, September 28-October 2, 2004.
  91. Cyber-Identity, Authority and Trust in an Uncertain World
    Invited plenary lecture at 1st Secure Knowledge Management Workshop, Buffalo, New York, September 23-24, 2004.
  92. Cyber-Identity, Authority and Trust in an Uncertain World
    Invited lecture at Intel Corporation, Hillsboro, Oregon, August 24, 2004.
  93. Managing Cyber-Identity, Authorization and Trust
    Panel at NSF Cybertrust PIs Meeting, Pittsburg, PA, August 18-20, 2004.
  94. Usage Control (UCON):A Vision for Next Generation Access Control
    Breakout at NSF Cybertrust PIs Meeting, Pittsburg, PA, August 18-20, 2004.
  95. Cyber-Identity and Authorization in an Uncertain World
    Lecture at George Mason University Symposium on IT for Homeland Security, Fairfax, Virginia, May 18, 2004.
  96. A Role-Based Approach to Federated Identity
    Presentation at RSA Conference, San Francisco, California, Feb. 23-28, 2004.
  97. 2003: 2

  98. Role-Based Access Control
    Tutorial at 8th ACM Symposium on Access Control Models and Technologies (SACMAT), June 2-3, 2003, Villa Gallia, Como, Italy.
  99. Rethinking Password Strategies
    Presentation at NACHA 03 meeting, 2003.
  100. 2002: 1

  101. Making Access Control More Usable
    Panel at 7th ACM Symposium on Access Control Models and Technologies (SACMAT), June 3-4, 2002, Monterey, CA.
  102. 2001: 1

  103. Future Directions in Role-Based Access Control Models
    Keynote lecture at 1st International Conference on Mathematical Methods, Models and Architectures for Computer Networks Security, Saint Petersburg, Russia, May 21-23, 2001.
  104. 1999: 1

  105. Engineering Authority and Trust in Cyberspace: A Role-Based Approach
    Keynote lecture at International Conference on Information Security (INFOSECU99), Shanghai, China, October 11-13, 1999.
  106. 1996: 2

  107. Access Control: The Neglected Frontier
    Keynote lecture at 1st Australasian Conference on Information Security and Privacy (ACISP), Wollongong, NSW, Australia, June 23-26, 1996.
  108. Leader, People-to-People Information Security Delegation to China
    Beijing, Guangzhou, Shanghai, Hong Kong, May 17–June 1, 1996.
  109. 1995: 1

  110. Pacific Rim Information Security Seminars
    Professional seminars in Sydney, Canberra (Australia), Singapore, Kuala Lumpur (Malaysia), Wellington (New Zealand), May 25–June 10 and November 2-18, 1995.

    1993: 2

  111. Lattice-Based Access Control Models
    Invited lecture at University of Milan, December 1993, Milan, Italy.
  112. Evolving Criteria for Information Security Products
    Keynote lecture at National Bankers Conference, December 1993, Rome, Italy.
  113.