Workshop Programme

1st Workshop on Security in highly connected IT systems (Workshop SHCIS ’14 )

     
    September 4, 2014
    09:00 - 10:30

    Workshop SHCIS - Session 1

    Location : 3 ( Lecture Hall 3)

  • Analyzing Recent Trends in Enterprise Identity Management
    Michael Kunz, Matthias Hummer, Ludwig Fuchs, Michael Netter, Günther Pernul

  • Trust and Big Data: A Roadmap for Research
    Johannes Sänger, Christian Richthammer, Sabri Hassan, Günther Pernul

  • Detectability of Deep Packet Inspection in common provider/consumer relations
    Christian Roth, Rolf Schillinger

  •  
    September 4, 2014
    10:30 - 11:00

    Coffee Break

     
    September 4, 2014
    11:00 - 12:00

    Workshop SHCIS - Session 2

    Location : 3 ( Lecture Hall 3)

  • A Fuzzy Security Investment Decision Support Model for Highly Distributed Systems
    Emrah Yasasin, Gerhard Rauchecker, Julian Prester, Guido Schryen

  • Applicability of Prediction Markets in Information Security Risk Management
    Pankaj Pandey, Einar Arthur Snekkenes

  •  
    September 4, 2014
    12:00 - 13:30

    Lunch

     
    September 4, 2014
    13:30 - 15:00

    Workshop SHCIS - Session 3

    Location : 3 ( Lecture Hall 3)

  • Towards a flexible virtualization-based architecture for malware detection and analysis
    Marius Vlad, Hans P. Reiser

  • Multi-tiered Security Architecture for ARM via the Virtualization and Security Extensions
    Tamas Lengyel, Thomas Kittel, Jonas Pfoh

  • An(other) Exercise in Measuring the Strength of Source Code Obfuscation
    Yan Zhuang, Mykola Protsenko, Tilo Müller, Felix Freiling

  •  
    September 4, 2014
    15:00 - 15:30

    Coffee Break

     
    September 4, 2014
    15:30 - 17:00

    Workshop SHCIS - Session 4

    Location : 3 ( Lecture Hall 3)

  • The di.me trust approach for supporting collaborative scenarios
    Marcel Heupel, Mohamed Bourimi, Dogan Kesdogan

  • Specifying IT security awareness
    Norman Hänsch, Zinaida Benenson

  • Honeypot Effectiveness in Different Categories of Attacks on Wireless Sensor Networks
    Jürgen Markert, Michael Massoth