Programme
8th International Conference on Trust, Privacy & Security in Digital Business (TrustBus'11 )
- Electrostatic Force Method: Trust Management Method Inspired by the Laws of Physics
Konrad Leszczynski, Maciej Zakrzewicz - Exploiting Proxy-based Federated Identity Management in Wireless Roaming Access
Antonio Lioy, Diana Berbecaru, Marco Domenico Aime - Gabriele Kern-Isberner, Technical University of Dortmund, Germany
Title: "Probabilistic Logics in Expert Systems: Approaches, Implementations, and Applications"
- Ram Herkanaidu, Education Manager, Global Educational Programs Development, Kaspersky Lab
Title: "The shifting security perimeter and the computer in your pocket"
- Privacy-Preserving Statistical Analysis on Ubiquitous Health Data
George Drosatos, Pavlos Efraimidis - A Safety-preserving Mix Zone for VANETs
Florian Scheuer, Karl-Peter Fuchs, Hannes Federrath - A Secure Smartphone Applications Roll-out Scheme
Alexios Mylonas, Bill Tsoumas, Stelios Dritsas, Dimitris Gritzalis - Privacy Preserving Tree Augmented Naïve Bayesian Multi – party Implementation on Horizontally Partitioned Databases
Maria-Eleni Skarkala, Manolis Maragoudakis, Lilian Mitrou, Stefanos Gritzalis - Secure Cloud Storage: Available Infrastructures and Architectures Review and Evaluation
Nikos Virvilis, Stelios Dritsas, Dimitris Gritzalis - TRAP: Open Decentralized Distributed Spam Filtering
Nahid Shahmehri, David Byers, Rahul Hiran - Best Effort and Practice Activation Codes
Gerhard de Koning Gans, Eric R. Verheul - Decentralized Generation of Multiple, Uncorrelatable Pseudonyms without Trusted Third Parties
Jan Lehnhardt, Adrian Spalka - Mining Roles from Web Application Usage Patterns
Gal-Oz Nurit , Yaron Gonen, Ran Yahalom, Ehud Gudes, Boris Rozenberg, Erez Shmueli - A Mobility and Energy-aware Hierarchical Intrusion Detection System for Mobile ad hoc Networks
Eleni Darra, Christoforos Dadoyan, Christos Xenakis, Sokratis Katsikas - An Evaluation of Anomaly-based Intrusion Detection Engines for Mobile Ad Hoc Networks
Christoforos Panos, Christos Xenakis, Ioannis Stavrakakis - Privacy Measures for Free Text Documents: Bridging the Gap between Theory and Practice
Hongyu Liu, Yunli Wang, Yonghua You, Liqiang Geng - Towards Legal Privacy Risk Assessment and Specification
Ebenezer Paintsil - Privacy-Preserving Storage and Access of Medical Data through Pseudonymization and Encryption
Johannes Heurix, Thomas Neubauer - Correcting a Delegation Protocol for Grids
Benjamin Aziz - Risk Assessment for Mobile Devices
Thomas Ledermuller, Nathan Clarke
2011-09-01 [09:00 - 10:00] : Session 1: Identity and Trust Management

2011-09-01 [10:00 - 10:30] : Coffee Break
2011-09-01 [10:30 - 12:00] : Keynote Talk
2011-09-01 [10:30 - 12:00] : Keynote Talk
2011-09-01 [12:00 - 14:00] : Lunch
2011-09-01 [14:00 - 15:30] : Session 2: Security and Privacy Models for Pervasive Information Systems

2011-09-01 [15:30 - 16:00] : Coffee Break
2011-09-01 [16:00 - 17:30] : Session 3: Reliability and Security of Content and Data

2011-09-02 [09:00 - 10:00] : Session 4: Authentication and Authorization in Digital Business

2011-09-02 [10:00 - 10:30] : Coffee Break
2011-09-02 [10:30 - 12:00] : Session 5: Intrution Detection and Information Filtering

2011-09-02 [12:00 - 14:00] : Lunch
2011-09-02 [14:00 - 15:30] : Session 6: Management of Privacy and Confidentiality

2011-09-02 [15:30 - 16:00] : Coffee Break
2011-09-02 [16:00 - 17:30] : Session 7: Cryptographic Protocols/ Usability of Security
