DEXA 2005 Poland Pictures

TrustBus Program

Tuesday, 5 September 2006

09:00 – 09:10 Opening – Welcome
Simone Fischer-Huebner, Steven Furnell, Costas Lambrinoudakis

09:10 – 10:00 Keynote TrustBus’06
Chair: Simone Fischer-Huebner

Privacy Practices and Economics - From Privacy Policies to Privacy SLAs
Invited talk by Günter Karjoth, IBM Research - Zurich

10:00 – 11:00 Session 1: Privacy and Identity Management
Chair: Günther Pernul

Towards Scalable Management of Privacy Obligations in Enterprises
Marco Casassa Mont

A new User-centric Identity Management Infrastructure for Federated Systems
Vassilis Poursalidis, Christos Nikolaou

11:00 – 11:30 Coffee Break

11:30 – 12:30 Keynote EC-Web

12:30 – 14:00 Lunch

14:00 – 15:30 Session 2: Security and Risk Management
Chair: Costas Lambrinoudakis

Information Security Risk Assessment Model for Risk Management
Dariusz Wawrzyniak

On the Limits of Cyber-Insurance
Rainer Böhme, Gaurav Kataria

Towards a Risk Management Perspective on AAIs
Christian Schläger, Thomas Nowey

15:30 – 16:00 Coffee Break

16:00 – 17:30 Session 3: Security Requirements and Development
Chair: Marco Casassa Mont

Towards a UML 2.0 Extension for the Modeling of Security Requirements in Business Processes
Alfonso Rodríguez, Eduardo Fernández-Medina, Mario Piattini

A Framework for Exploiting Security Expertise in Application Development
Theodoros Balopoulos, Lazaros Gymnopoulos, Maria Karyda, Spyros Kokolakis, Stefanos Gritzalis, Sokratis Katsikas

On Diffusion and Confusion – Why Electronic Signatures Have Failed
Heiko Roßnagel

Wednesday, 6 September 2006

09:00 – 11:00 Session 4: Privacy Enhancing Technologies and Privacy Management
Chair: Leszek T. Lilien

Extending P3P to Facilitate Proxies which Pose as a Potential Threat to Privacy
Wesley Brandi, Martin S Olivier

A Systematic Approach to Privacy Enforcement and Policy Compliance Checking in Enterprises
Marco Casassa Mont, Siani Pearson, Robert Thyne

A Generic Privacy Enhancing Technology for Pervasive Computing Environments
Stelios Dritsas, John Tsaparas, Dimitris Gritzalis

Bringing the User Back into Control: A New Paradigm for Usability in Highly Dynamic Systems
Sebastian Höhn

11:00 – 11:30 Coffee Break

11:30 – 12:30 Keynote TrustBus’06
Chair: Steven Furnell

Building the Information Assurance Community of Purpose
Invited talk by Jeremy Ward, Symantec EMEA

12:30 – 14:00 Lunch

14:00 – 15:30 Panel Discussion “Is security without Trust Feasible ?”
Chair: Leszek T. Lilien, Department of Computer Science, Western Michigan University, USA

Panelists:
Bharat Bhargava, Department of Computer Sciences, Purdue University, West Lafayette, Indiana, USA.

Simone Fischer-Hübner, Department of Computer Science, Karlstad University, Karlstad, Sweden

Sanjay Madria, Department of Computer Science, University of Missouri-Rolla, Rolla, Missouri, USA.

Krzysztof Zieliński, Department of Computer Science, AGH University of Science and Technology, Kraków (Cracow), Poland

15:30 – 16:00 Coffee Break

16:00 – 17:30 Session 5: Access Control Models
Chair: Jeremy Ward

Extending SQL to Allow the Active Usage of Purposes
Wynand van Staden, Martin S Olivier

FGAC-QD: Fine-Grained Access Control Model based on Query Decomposition Strategy
Guoqiang Zhan, Zude Li, Xiaojun Ye, Jianmin Wang

A Framework for Modeling Restricted Delegation in Service Oriented Architecture
Muhammad Alam, Michael Hafner, Ruth Breu, Stefan Unterthiner

Thursday, 7 September 2006

09:00 – 11:00 Session 6: Trust and Reputation
Chair: Martin S. Olivier

Reputation-based Trust Systems for P2P Applications: Design Issues and Comparison Framework
Eleni Koutrouli , Aphrodite Tsalgatidou

Towards Trust in Digital Rights Management Systems
Jürgen Nützel, Anja Beyer

Cluster-based Analysis and Recommendation of Sellers in Online Auctions
Mikolaj Morzy, Juliusz Jezierski

Trust Model Architecture: Defining Prejudice by Learning
M. Wojcik, JHP. Eloff, HS. Venter

11:00 – 11:30 Coffee Break

11:30 – 12:30 Keynote DaWak

12:30 – 14:00 Lunch

14:00 – 15:30 Session 7: Security Protocols
Chair: Costas Lambrinoudakis

How to Protect a Signature from Being Shown to a Third Party
Marek Klonowski, Przemysław Kubiak, Mirosław Kutyłowski, Anna Lauks

Security Analysis and Improvement for Key Issuing Schemes in ID-based Cryptography
Saeran Kwon, Sang-Ho Lee

A Secure E-tender Submission Protocol
Rong Du, Colin Boyd, Ernest Foo

15:30 – 16:00 Coffee Break

16:00 – 17:00 Session 8: Security and Privacy in Mobile Environments
Chair: Christian Schlaeger

A Sophisticated Solution for Revealing Attacks on Wireless LAN
René Neumerkel, Stephan Groß

Information Leakage in Ubiquitous Voice-over-IP Communications
Thorsten Neumann, Heiko Tillwick, Martin S Olivier

17:00 – 17:10 Conference Closing
Simone Fischer-Huebner, Steven Furnell, Costas Lambrinoudakis