BEGIN:VCALENDAR
VERSION:2.0
PRODID:-//Talks.cam//talks.cam.ac.uk//
X-WR-CALNAME:Talks.cam
BEGIN:VEVENT
SUMMARY:Function-Based Access Control - Yvo G. Desmedt\, Department of Com
 puter Science\, University of Texas at Dallas
DTSTART:20181204T160000Z
DTEND:20181204T170000Z
UID:TALK115516@talks.cam.ac.uk
CONTACT:Alexander Vetterl
DESCRIPTION:Inspired by Functional Encryption\, we introduce Function-Base
 d Access Control (FBAC). From an abstract viewpoint\, we suggest storing a
 ccess authorizations as a three-dimensional tensor\, or an Access Control 
 Tensor (ACT) rather than the two-dimensional Access Control Matrix (ACM). 
 \n\nIn FBAC\, applications do not give blind folded execution right and ca
 n only invoke commands that have been authorized for function defined data
  segments. So\, one might be authorized to use a certain command on one ob
 ject\, while being forbidden to use the same command on another object. Su
 ch behavior can not be efficiently modeled using the classical access cont
 rol matrix or achieved efficiently using cryptographic mechanisms.\n\n--\n
 \nSHORT BIO\n\nYvo Desmedt is the Jonsson Distinguished Professor at the U
 niversity of Texas at Dallas\, a Honorary Professor at University College 
 London\, a Fellow of the International Association of Cryptologic Research
  (IACR) and a Member of the Belgium Royal Academy of Science. He received 
 his Ph.D. (1984\, Summa cum Laude) from the University of Leuven\, Belgium
 . \n\nHe held positions at: Universite de Montreal\, University of Wiscons
 in-Milwaukee (founding director of the Center for Cryptography\, Computer 
 and Network Security)\, and Florida State University (Director of the Labo
 ratory of Security and Assurance in Information Technology\, one of the fi
 rst 14 NSA Centers of Excellence). He was BT Chair and Chair of Informatio
 n Communication Technology at University College London. He has held numer
 ous visiting appointments. He is the Editor-in-Chief of IET Information Se
 curity and Chair of the Steering Committees of CANS.  He was Program Chair
  of e.g.\, Crypto 1994\, the ACM Workshop on Scientific Aspectsof Cyber Te
 rrorism 2002\, and ISC 2013. \n\nHe has authored over 200 refereed papers\
 , primarily on cryptography\, computer security\, and network security. He
  has made important predictions\, such as his 1983 technical description h
 ow cyber could be used to attack control systems (realized by Stuxnet)\, a
 nd his 1996 prediction hackers will target Certifying Authorities (DigiNot
 ar was targeted in 2011).\n
LOCATION:FW11\, Computer Laboratory\, William Gates Building
END:VEVENT
END:VCALENDAR
