DEXA 2005 Copenhagen Pictures

TrustBus Program

Tuesday, 23 August 2005

Session 1: Digital Business (1)
10.30- 12.30 Chair: Javier López

Welcome by the Programme Committee Chairs

Sec-Shield: Security Preserved Distributed Knowledge Management between Autonomous Domains
Petros Belsis, Stefanos Gritzalis, Apostolos Malatras, Christos Skourlas, Ioannis Chalaris

Protection Mechanisms against Phishing Attacks
Klaus Plößl, Hannes Federrath, and Thomas Nowey

Dropout-Tolerant TTP-Free Mental Poker
Jordi Castellà-Roca, Francesc Sebé, and Josep Domingo-Ferrer

A Self-healing Mechanism for an Intrusion Tolerance System
Bumjoo Park, Kiejin Park, and Sungsoo Kim

12.40 – 14.00 Lunch

Keynote TrustBus Conference
14.00 – 15.00 Chair: Günther Pernul

Privacy Enhanced Technology, Methods – Markets – Misuse
Invited Talk by Hannes Federrath, University of Regensburg

Session 2: Mobile / Wireless Services (1)
15.00 – 15.30 Chair: Günther Pernul

A Multilateral Secure Payment System for Wireless LAN Hotspots
Stephan Groß, Sabine Lein, and Sandra Steinbrecher

15.30 – 16.00 Coffee Break

Session 3A: Certificate Revocation / Index Search
16.00 – 17.00 Chair: Jinaying Zhou

Efficient Certificate Revocation System Implementation : Huffman Merkle Hash Tree (HuffMHT)
Jose L. Munoz, Jordi Forne, Oscar Esparza, and Manel Rey

Secure Index Search for Groups
Hyun-A Park, Jin Wook Byun, and Dong Hoon Lee

Session 3B: Trust (1)
16.00 – 17.00 Chair: Juan Gonzàles Nieto

Provision of Secure Policy Enforcement between Small and Medium Governmental Organizations
Nikolaos Oikonomidis, Sergiu Tcaciuc, Christoph Ruland

Maximizing Utility of Mobile Agent Based E-Commerce Applications with Trust Enhanced Security
Ching Lin, Vijay Varadharajan, and Yan Wang

Wednesday, 24 August 2005

Session 4: Digital Signature
10.30 – 12.30 Chair: Jordi Forné

An Improved Group Signature Scheme
Jianhong Zhang, Jiancheng Zou, and Yumin Wang

Efficient Member Revocation in Group Signature Schemes
Eun Young Choi, Hyun-Jeong Kim, and Dong Hoon Lee

Conditional Digital Signatures
Marek Klonowski, Miroslaw Kutylowski, Anna Lauks, and Filip Zagorski

A Mediated Proxy Signature Scheme with Fast Revocation for Electronic Transactions
Seung-Hyun Seo, Kyung-Ah Shim, and Sang-Ho Lee

12.30 - 14.00 Lunch

Session 5: Digital Business (2)
14.00 – 15.30 Chair: Christian Schläger

Protecting Online Rating System from Unfair Ratings
Jianshu Weng, Chunyan Miao, and Angela Goh

Anonynous Payment in a Fair E-Commerce Protocol with Verifiable TTP
Magdalena Payeras-Capellà, Josep Lluís Ferrer-Gomila, and Llorenç Huguet-Rotger

Designing Secure E-Tendering Systems
Rong Du, Ernest Foo, Juan Gonzalez Nieto, and Colin Boyd

15.30 - 16.00 Coffee Break

Session 6: Mobile / Wireless Services (2)
16.00 – 17.30 Chair: Torsten Priebe

Secure Group Communications over Combined Wired and Wireless Networks
Junghyun Nam, Seungjoo Kim, andDongho Won

A Privacy Enhancement Mechanism for Location Based Service Architectures using Transaction Pseudonyms
Oliver Jorns, Oliver Jung, Julia Gross, and Sandford Bessler

Making Money with Mobile Qualified Electronic Signatures
Heiko Rossnagel, Denis Royer

Thursday, 25 August 2005

Session 7: Privacy (2)
10.30 – 12.30 Chair: Hannes Federrath

Privacy Enforcement for IT Governance in Enterprises: Doing it for Real
Marco Casassa Mont, Robert Thyne, andPete Bramhall

An Adaptive Privacy Management System for Data Repositories
Marco Casassa Mont and Siani Pearson

Privacy Preserving Data Mining Services on the Web
Ayca Azgin Hintoglu, Yucel Saygin, Salima Benbernou, and Mohand Said Hacid

Reading your Keystroke: Whose Mail is it?
Sylvia Mercado Kierkegaard

12.30 – 14.00 Lunch

Session 8A: E-Auctions
14.00 – 15.30 Chair: Christoph Ruland

A Novel Construction of Two-party Private Bidding Protocols from Yao`s Millionaires Problem
Huafei Zhu and Feng Bao

An Improved Double Auction Protocol against False Bids
JungHoon Ha, Jianying Zhou, and SangJae Moon

An Investigation of Dispute Resolution Mechanisms on Power and Trust: A Domain Study of Online Trust in e-Auctions
Glenn Robert Bewsell, Rodger Jamieson, Adrian Gardiner, and Deborah Bunker

Session 8B: Smart Cards / Authentication
14.00 – 15.30 Chair: Günther Pernul

A Secure Fingerprint Authentication System on an Untrusted Computing Environment
Yongwha Chung, Daesung Moon, Taehae Kim, and SungBum Pan

Security Enhancement for Password Authentication Schemes with Smart Cards
Eun-Jun Yoon, Woo-Hun Kim, and Kee-Young Yoo

Securing Operating System Services Based on Smart Cards
Luigi Catuogno, Roberto Gassira, Michele Masullo, and Ivan Visconti

15.30 – 16.00 Coffee Break

Session 9: Trust (2)
16.00- 17.00 Chair: Jianying Zhou

The Fuzzy and Dynamic Nature of Trust
Elizabeth Chang, Patricia Thompson, Tharam Dillon, and Farookh Hussain

Towards an Ontology of Trust
Lea Viljanen