Programme

8th International Conference on Trust, Privacy & Security in Digital Business (TrustBus'11 )

     

    2011-09-01 [09:00 - 10:00] : Session 1: Identity and Trust Management

    Session Chair : Costas Lambrinoudakis

  • Electrostatic Force Method: Trust Management Method Inspired by the Laws of Physics
    Konrad Leszczynski, Maciej Zakrzewicz

  • Exploiting Proxy-based Federated Identity Management in Wireless Roaming Access
    Antonio Lioy, Diana Berbecaru, Marco Domenico Aime

  •  

    2011-09-01 [10:00 - 10:30] : Coffee Break

     

    2011-09-01 [10:30 - 12:00] : Keynote Talk

    Session Chair : Klaus-Dieter Schewe

  • Gabriele Kern-Isberner, Technical University of Dortmund, Germany

    Title: "Probabilistic Logics in Expert Systems: Approaches, Implementations, and Applications"


  •  

    2011-09-01 [10:30 - 12:00] : Keynote Talk

    Session Chair : Steven Furnell

  • Ram Herkanaidu, Education Manager, Global Educational Programs Development, Kaspersky Lab

    Title: "The shifting security perimeter and the computer in your pocket"


  •  

    2011-09-01 [12:00 - 14:00] : Lunch

     

    2011-09-01 [14:00 - 15:30] : Session 2: Security and Privacy Models for Pervasive Information Systems

    Session Chair : Guenther Pernul

  • Privacy-Preserving Statistical Analysis on Ubiquitous Health Data
    George Drosatos, Pavlos Efraimidis

  • A Safety-preserving Mix Zone for VANETs
    Florian Scheuer, Karl-Peter Fuchs, Hannes Federrath

  • A Secure Smartphone Applications Roll-out Scheme
    Alexios Mylonas, Bill Tsoumas, Stelios Dritsas, Dimitris Gritzalis

  •  

    2011-09-01 [15:30 - 16:00] : Coffee Break

     

    2011-09-01 [16:00 - 17:30] : Session 3: Reliability and Security of Content and Data

    Session Chair : Christos Xenakis

  • Privacy Preserving Tree Augmented Naïve Bayesian Multi – party Implementation on Horizontally Partitioned Databases
    Maria-Eleni Skarkala, Manolis Maragoudakis, Lilian Mitrou, Stefanos Gritzalis

  • Secure Cloud Storage: Available Infrastructures and Architectures Review and Evaluation
    Nikos Virvilis, Stelios Dritsas, Dimitris Gritzalis

  • TRAP: Open Decentralized Distributed Spam Filtering
    Nahid Shahmehri, David Byers, Rahul Hiran

  •  

    2011-09-02 [09:00 - 10:00] : Session 4: Authentication and Authorization in Digital Business

    Session Chair : Christos Xenakis

  • Best Effort and Practice Activation Codes
    Gerhard de Koning Gans, Eric R. Verheul

  • Decentralized Generation of Multiple, Uncorrelatable Pseudonyms without Trusted Third Parties
    Jan Lehnhardt, Adrian Spalka

  •  

    2011-09-02 [10:00 - 10:30] : Coffee Break

     

    2011-09-02 [10:30 - 12:00] : Session 5: Intrution Detection and Information Filtering

    Session Chair : Costas Lambrinoudakis

  • Mining Roles from Web Application Usage Patterns
    Gal-Oz Nurit , Yaron Gonen, Ran Yahalom, Ehud Gudes, Boris Rozenberg, Erez Shmueli

  • A Mobility and Energy-aware Hierarchical Intrusion Detection System for Mobile ad hoc Networks
    Eleni Darra, Christoforos Dadoyan, Christos Xenakis, Sokratis Katsikas

  • An Evaluation of Anomaly-based Intrusion Detection Engines for Mobile Ad Hoc Networks
    Christoforos Panos, Christos Xenakis, Ioannis Stavrakakis

  •  

    2011-09-02 [12:00 - 14:00] : Lunch

     

    2011-09-02 [14:00 - 15:30] : Session 6: Management of Privacy and Confidentiality

    Session Chair : Nahid Shahmehri

  • Privacy Measures for Free Text Documents: Bridging the Gap between Theory and Practice
    Hongyu Liu, Yunli Wang, Yonghua You, Liqiang Geng

  • Towards Legal Privacy Risk Assessment and Specification
    Ebenezer Paintsil

  • Privacy-Preserving Storage and Access of Medical Data through Pseudonymization and Encryption
    Johannes Heurix, Thomas Neubauer

  •  

    2011-09-02 [15:30 - 16:00] : Coffee Break

     

    2011-09-02 [16:00 - 17:30] : Session 7: Cryptographic Protocols/ Usability of Security

    Session Chair : Steven Furnell

  • Correcting a Delegation Protocol for Grids
    Benjamin Aziz

  • Risk Assessment for Mobile Devices
    Thomas Ledermuller, Nathan Clarke