Conference Programme

10th International Conference on Trust, Privacy & Security in Digital Business (TrustBus 2013 )

     
    August 28, 2013
    09:15 - 09:30

    TrustBus - Opening : Welcome

    Location : A (Lecture Hall A)

     
    August 28, 2013
    09:30 - 10:30

    TrustBus - Session 1 : Access Control and Authentication

    Location : A (Lecture Hall A)

    Session Chair : Costas Lambrinoudakis

  • Improving Kerberos Ticket Acquisition during Application Service Access Control
    Fernando Pereñíguez-García, Rafael Marin-Lopez, Antonio F. Skarmeta-Gomez

  • A better time approximation scheme for e-passports
    Charalambos Petrou, Christoforos Ntantogian, Christos Xenakis

  •  
    August 28, 2013
    10:30 - 11:00

    Coffee Break

     
    August 28, 2013
    11:00 - 12:00

    Keynote Talk : Trevor Bench-Capon

    Location : B (Lecture Hall B)

    Session Chair : A Min Tjoa

  • Structuring E-Participation in Policy Making Through Argumentation
    Trevor Bench-Capon, University of Liverpool, UK

  •  
    August 28, 2013
    12:00 - 13:30

    Lunch

     
    August 28, 2013
    13:30 - 15:00

    TrustBus - Session 2 : Identity and Trust Management

    Location : A (Lecture Hall A)

    Session Chair : Bjørnar Tessem

  • Trust Evaluation of a System for an Activity
    Nagham Alhadad, Patricia Serrano-Alvarado, Yann Busnel, Philippe Lamarre

  • Defining a Trust Framework Design Process
    Mark Vinkovits, Andreas Zimmermann

  • Executable Model-Based Risk Analysis Method for Identity Management Systems:Using Hierarchical Colored Petri Nets
    Ebenezer Paintsil, Lothar Fritsch

  •  
    August 28, 2013
    15:00 - 15:30

    Coffee Break

     
    August 28, 2013
    15:30 - 17:30

    TrustBus - Session 3 : Pivacy and Confidentiality Management

    Location : A (Lecture Hall A)

    Session Chair : Alexandre Viejo

  • Preserving the User's Privacy in Social Networking Sites
    Alexandre Viejo, Jordi Castellà-Roca, Guillem Rufián

  • A classification of factors influencing low adoption of PETs among SNS users
    Konstantina Vemou, Maria Karyda

  • Towards Privacy-by-Design Peer-to-Peer Cloud Computing
    Leucio Antonio Cutillo, Antonio Lioy

  • Preservation of Utility Through Hybrid k-Anonymization
    Mehmet Ercan Nergiz, Muhammed Zahit Gök, Ufuk Özkanli

  •  
    August 29, 2013
    09:30 - 10:30

    TrustBus - Session 4 : Information Systems Security

    Location : 12 (Lecture Hall 12)

    Session Chair : Patricia Serrano Alvarado

  • The security of information systems in Greek hospitals
    George Aggelinos, Sokratis Katsikas

  • Risk Acceptance and Rejection for Threat and Opportunity Risks in Conflicting Incentives Risk Analysis
    Lisa Rajbhandari, Einar Snekkenes

  •  
    August 29, 2013
    10:30 - 11:00

    Coffee Break

     
    August 29, 2013
    11:00 - 12:00

    Keynote Talk : Tova Milo

    Location : 11 (Lecture Hall 11)

    Session Chair : Lenka Lhotská

  • Making Collective Wisdom Wiser
    Tova Milo, Tel Aviv University, Israel

  •  
    August 29, 2013
    12:00 - 13:30

    Lunch

     
    August 29, 2013
    13:30 - 15:00

    TrustBus - Session 5 : Security Policies / Legal Issues

    Location : 12 (Lecture Hall 12)

    Session Chair : Stefanos Gritzalis

  • PRoCAVE: Privacy-preserving Collection and Authenticity Validation of online Evidence
    Efthymios Lalas, Lilian Mitrou, Costas Lambrinoudakis

  • Assessing the Feasibility of Security Metrics
    Bernhard Heinzle, Steven Furnell

  •  
    August 29, 2013
    15:00 - 15:30

    Coffee Break

     
    August 29, 2013
    15:30 - 17:00

    TrustBus - Session 6 : Trust and Privacy in Mobile and Pervasive Environments

    Location : 12 (Lecture Hall 12)

    Session Chair : Costas Lambrinoudakis

  • The influence of social media use on willingness to share location information
    Bjørnar Tessem, Lars Nyre

  • A qualitative metrics vector for the awareness of smartphone security users
    Dimitris Gritzalis, Alexios Mylonas, Bill Tsoumas, Theodore Apostolopoulos

  • Trustworthy Selection of Cloud Providers based on Security and Privacy Requirements: Justifying Trust Assumptions
    Michalis Pavlidis, Haralambos Mouratidis, Christos Kalloniatis, Shareeful Islam, Stefanos Gritzalis