Program
Paper "Usage Control Enforcement with Data Flow Tracking for X11" has been switched with paper "Protecting Mobile Code Privacy With Resilient Spy Agent Group Testing"
- Thursday September 24, 2009
-
- 09:00 - 10:30 Business meeting
-
- 10:30 - 11:00 Coffee break
-
- 11:00 - 12:00 Invited talk
- Selected Topics in Physical-Layer Security
Srdjan Capkun
- 12:00 - 12:30 Session 1: Information Security Management
- Information Security
Management: A Collaborative Approach
Frank Innerhofer-Oberperfler, Daniel Bachlechner, Ronald Maier, Verena
Hahn, Manuela Weitlaner, Ruth Breu
- 12:30 - 14:00 Lunch
-
- 14:00 - 15:30 Session 2: Social Networks and Trust
- A Measurement of Mixing Time in
Social Networks
Matteo Dell'Amico, Yves Roudier
- Resource Access in Multi-Provider
Networks Using Role Based Trust Management
Paolo Mori, Maurizio Colombo, Fabio Martinelli, Barbara Martini, Fabio
Baroncelli, Piero Castoldi
- Distingushing Fact and
Fiction: Data Mining Online Identities
Roya Feizy, Ian Wakeman, Dan Chalmers
- 15:30 - 16:00 Coffee break
-
- 16:00 - 17:30 Session 3: Cryptography, Privacy and Language-based Security
- Experimenting with Distributed
Generation of RSA Keys
Thierry Congos, Francois Lesueur
- Usage Control Enforcement with Data Flow
Tracking for X11
Alexander Pretschner, Matthias Buchler, Matus Harvan, Christian
Schaefer, Thomas Walter
- Optimizing IRM with Automata Modulo Theory
Fabio Massacci, Ida Sri Rejeki Siahaan
-
- Friday September 25, 2009
-
- 09:00 - 10:00 Invited talk
- ERCIM STM WG award
for the best Ph.D. Thesis on Security and Trust management
Claudio A. Ardagna
-
- 10:00 - 10:30 Session 4: Reputation Management
- Challenges for Robust Trust and
Reputation Systems
Audun Josang, Jennifer Golbeck
- 10:30 - 11:00 Coffee break
-
- 11:00 - 12:30 Session 5: Access Control and Usage Control
- A Multimodal view on Access Control and Trust Management:
Fibred Security Language
Guido Boella, Dov M. Gabbay, Valerio Genovese and Leendert van der
Torre
- Detecting and Countering Insider
Threats: Can Policy-Based Access Control Help?
Jason Crampton, Michael Huth
- Protecting Mobile Code Privacy With Resilient Spy
Agent Group Testing
Georgios Kalogridis
|