5th International Workshop on Security and Trust Management (STM 2009)
in conjunction with ESORICS 2009

Saint Malo, France - September 24-25, 2009

Home  |  Call for Papers [pdf]  |  Committees  |  Important dates  |  Program  |  Registration


Paper "Usage Control Enforcement with Data Flow Tracking for X11" has been switched with paper "Protecting Mobile Code Privacy With Resilient Spy Agent Group Testing"
Thursday September 24, 2009
09:00 - 10:30 Business meeting
10:30 - 11:00 Coffee break
11:00 - 12:00 Invited talk
Selected Topics in Physical-Layer Security
Srdjan Capkun

12:00 - 12:30 Session 1: Information Security Management
Information Security Management: A Collaborative Approach
Frank Innerhofer-Oberperfler, Daniel Bachlechner, Ronald Maier, Verena Hahn, Manuela Weitlaner, Ruth Breu

12:30 - 14:00 Lunch
14:00 - 15:30 Session 2: Social Networks and Trust
A Measurement of Mixing Time in Social Networks
Matteo Dell'Amico, Yves Roudier

Resource Access in Multi-Provider Networks Using Role Based Trust Management
Paolo Mori, Maurizio Colombo, Fabio Martinelli, Barbara Martini, Fabio Baroncelli, Piero Castoldi

Distingushing Fact and Fiction: Data Mining Online Identities
Roya Feizy, Ian Wakeman, Dan Chalmers

15:30 - 16:00 Coffee break
16:00 - 17:30 Session 3: Cryptography, Privacy and Language-based Security
Experimenting with Distributed Generation of RSA Keys
Thierry Congos, Francois Lesueur

Usage Control Enforcement with Data Flow Tracking for X11
Alexander Pretschner, Matthias Buchler, Matus Harvan, Christian Schaefer, Thomas Walter

Optimizing IRM with Automata Modulo Theory
Fabio Massacci, Ida Sri Rejeki Siahaan
Friday September 25, 2009
09:00 - 10:00 Invited talk
ERCIM STM WG award for the best Ph.D. Thesis on Security and Trust management
Claudio A. Ardagna

10:00 - 10:30 Session 4: Reputation Management
Challenges for Robust Trust and Reputation Systems
Audun Josang, Jennifer Golbeck

10:30 - 11:00 Coffee break
11:00 - 12:30 Session 5: Access Control and Usage Control
A Multimodal view on Access Control and Trust Management: Fibred Security Language
Guido Boella, Dov M. Gabbay, Valerio Genovese and Leendert van der Torre

Detecting and Countering Insider Threats: Can Policy-Based Access Control Help?
Jason Crampton, Michael Huth

Protecting Mobile Code Privacy With Resilient Spy Agent Group Testing
Georgios Kalogridis

For any questions, please contact the program chairs: