PST2011
Ninth Annual Conference
on Privacy, Security and Trust
Program
(Outline Agenda)
Day 1: Tuesday, July 19, 2011 - Innovation Day at PST 2011
8:00 a.m. |
Registration and Breakfast |
8:30 a.m. |
Official Opening PST 2011 Conference |
9:00 a.m. |
PST 2011 Conference Morning Keynote: Emerging Cyber Crime Threats, Ron Plesco, President and CEO, National Cyber-Forensics Training Alliance, USA |
10:00 a.m |
Refreshment Break |
10:15 a.m. |
PST Morning Workshop / Tutorial: Keeping Your Web Apps Secure: The OWASP Top 10 & Beyond, Robert H’obbes’ Zakon, Zakon Group LLC |
10:15 a.m. |
PST Symposium Part 1 – Morning Session |
12:00 p.m. |
Luncheon |
2:00 p.m. |
PST 2011 Conference Afternoon Keynote: High Profile Targeted Attacks, Dean Turner, Director, Global Intelligence Network, Symantec |
3:00 p.m. |
Refreshment Break |
3:15 p.m. |
PST Afternoon Workshop / Tutorial: Ethical Hacking and Network Forensics Investigation Techniques, Dr. Issa Traore, University of Victoria |
3:15 p.m. |
PST Symposium Part 2 - Afternoon Session |
6:00 p.m. |
Networking Reception |
7:00 p.m. |
Adjourn |
Day 2: Wednesday, July 20, 2011
8:00 a.m. |
Registration and Breakfast |
9:00 a.m. |
Academic Keynote: New Combinatorial Techniques for User-Private Information Retrieval, Dr. Douglas Stinson, University of Waterloo |
10:00 a.m |
Refreshment Break |
10:20 a.m. |
Paper Sessions (Parallel) |
12:00 p.m. |
Luncheon |
2:00 p.m. |
Paper Sessions (Parallel) |
3:40 p.m. |
Refreshment Break |
4:00 p.m. |
Poster Session |
6:00 p.m. |
PST2011 Banquet, Hotel Maritime Plaza |
9:00 p.m. |
Adjourn |
Day 3: Thursday, July 21, 2011
8:00 a.m. |
Registration and Breakfast |
9:00 a.m. |
Academic Keynote: Secure Computational and Storage Outsourcing, Dr. Mikhail Atallah, Purdue University |
10:00 a.m |
Refreshment Break |
10:20 a.m. |
Paper Sessions (Parallel) |
12:00 p.m. |
Luncheon |
2:00 p.m. |
Paper Sessions (Parallel) |
4:00 p.m. |
Closing Remarks |
Detail Technical Program
Day 1: Tuesday, July 19, 2011 - Innovation Day at PST2011
8:00 a.m. |
Registration and Breakfast (Atrium of the EV Building) |
8:30 a.m. |
Official Opening PST2011 Conference (Room EV1.605,
EV Building) |
9:00 a.m |
PST 2011 Conference Morning Keynote: Emerging Cyber Crime Threats, Ron Plesco, President and CEO, National Cyber-Forensics Training Alliance, USA (Room EV1.605,
EV Building) |
10:00 a.m. |
Refreshment Break |
10:15 a.m. |
PST Morning Workshop / Tutorial: Keeping Your Web Apps Secure: The OWASP Top 10 & Beyond, Robert H’obbes’ Zakon, Zakon Group LLC (Room EV3.309, EV Building) |
10:15 a.m. |
PST Morning Workshop / Tutorial: Keeping Your Web Apps Secure: The OWASP Top 10 & Beyond, Robert H’obbes’ Zakon, Zakon Group LLC (Room EV3.309,
EV Building) |
10:15 a.m. |
PST Symposium Part 1 – Morning Session (Room EV1.605,
EV Building)
- C1 KEYNOTE Strategic Implications of Social Media, James Norrie, Ryerson University
- C2 Overview of modern tools and techniques to capture specialized knowledge, Robert Charpentier, Frédéric Painchaud; DRDC Valcartier
|
12:00 p.m. |
Luncheon (Atrium of the LB
Building) |
2:00 p.m. |
PST 2011 Conference Afternoon Keynote: High Profile Targeted Attacks, Dean Turner, Director, Global Intelligence Network, Symantec (Room EV1.605, EV
Building) |
3:00 p.m. |
Refreshment Break |
3:15 p.m. |
PST Afternoon Workshop / Tutorial: Ethical Hacking and Network Forensics Investigation Techniques, Dr. Issa Traore, University of Victoria (Room EV3.309,
EV Building) |
3:15 p.m. |
PST Symposium Part 2 - Afternoon Session (Room EV1.605,
EV Building)
- C3 Public Health Model of Information Security. Peter Cassidy, Anti Phishing Working Group
- C4 Network Security, Eric Ziegast, Internet Systems Consortium
- C5 MASAS Multi-Agency Situational Awareness, Doug Allport Owner, Allport Group Inc.
|
6:00 p.m |
Networking Reception (11th Floor, EV11,
EV Building) |
7:30 p.m. |
Adjourn |
Day 2 : Wednesday, July 20, 2011
8:00 a.m. |
Registration and Breakfast (Atrium of the EV Building) |
9:00 a.m |
Keynote Talk: Douglas Stinson, University of Waterloo (Room EV1.605,
EV Building.
Chair: Ali Ghorbani) |
10:00 a.m. |
Refreshment Break |
10:20 a.m. |
Security Track (Room EV1.605,
EV Building. Chair: Nadia Tawbi)
Abbas Javadtalab, Laith Abbadi, Mona Omidyeganeh, Carlisle Adams, Shervin Shirmohammadi and Abdulmotaleb El Saddik. Transparent Non-Intrusive Multimodal Biometric System For Video Conference Using The Fusion Of Face And Ear Recognition
Nick Mailloux, Ali Miri and Monica Nevins. Forward Secure Identity-based Key Agreement for Dynamic Groups
Jiangong Weng and Amy Felty. An Implementation of a Verification Condition Generator for Foundational Proof-Carrying Code
Bernard Stepien, Amy Felty and Stan Matwin. Advantages of a Non-Technical XACML Notation in Role-Based Models |
10:20 a.m. |
Trust track (Room EV1.615,
EV Building. Chair: Greg Sprague)
Mark Manulis and Marion Steiner. UPBA: User-Authenticated Property-Based Attestation
Joshua Gorner, Jie Zhang and Robin Cohen. Improving the Use of Advisor Networks for Multi-Agent Trust Modelling
Jesus Gonzalez, Mohd Anwar and James B.D. Joshi. A Trust-based Approach against IP-spoofing Attacks
Kevin Ouyang, Binod Vaidya and Dimitrios Makrakis. A Probabilistic-Based Approach towards Trust Evaluation using Poisson Hidden Markov Models and Bonus Malus Systems |
12:00 p.m. |
Luncheon (Atrium of the LB
Building) |
2:00 p.m. |
Security Track (Room EV1.615,
EV Building. Chair: Amy Felty)
Shirantha Wijesekera, Xu Huang and Dharmendra Sharma. Performance Analysis of QKD Based Key Distribution for IEEE 802.11 Networks
François Gauthier, Dominic Letarte, Thierry Lavoie and Ettore Merlo. Extraction and Comprehension of Moodle’s Access Control Model: A case study
Roopa Vishwanathan and Steve Tate. General Secure Function Evaluation Using Standard Trusted Computing Hardware
Dina Said, Lisa Stirling, Peter Federolf and Ken Barker. Data Preprocessing for Distance-based Unsupervised Intrusion Detection |
2:00 p.m. |
Privacy Track (Room EV1.605,
EV Building. Chair: Frédéric Cuppens)
Tristan Allard, Benjamin Nguyen and Philippe Pucheral. Safe Realization of the Generalization Privacy Mechanism
Ali Noman, Sk. Md. Mizanur Rahman and Carlisle Adams. Improving Security and Usability of Low Cost RFID Tags.
Sk. Md. Mizanur Rahman, Md. Mehedi Masud, Carlisle Adams, Khalil El-Khatib, Hussein Mouftah and Eiji Okamoto. Cryptographic Security Models for eHealth P2P Database Management Systems Network
Esma Aïmeur and David Schönfeld. The ultimate invasion of privacy: identity theft |
3:40 p.m. |
Refreshment Break |
4:20 p.m. |
POSTER SESSION (Room EV2.260,
EV Building)
Hagen Stübing, Murat Ceven and Sorin A. Huss. Short Paper: Diffie-Hellman based Group Signatures for Car-to-X Communication
Abdulsalam Yassine, Ali Asghar Nazari Shirehjini, Shervin Shirmohammadi and Thomas T.Tran. Online Information Privacy: Agent-Mediated Payoff
Martín Barrere, Gustavo Betarte and Marcelo Rodríguez. Towards machine-assisted formal procedures for the collection of digital evidence
Lilia Georgieva. Modelling of security properties in Alloy
Serguei Mokhov. On the Need for Data Flow Graph Visualization of Forensic Lucid Programs and Encoded Evidence, and their Evaluation by GIPSY
Riaz Ahmed Shaikh, Kamel Adi, Luigi Logrippo and Serge Mankovski. Risk-based Decision Making Method for Access Control Systems
Yoshihiro Kaneko, Yuji Kinpara and Yuta Shiomi. A Hamming Distance-like Filtering in Keystroke Dynamics
|
6:00 p.m |
PST2011 Banquet, Hotel Maritime Plaza |
9:00 p.m. |
Adjourn |
Day 3 : Thursday, July 21, 2011
8:00 a.m. |
Registration and Breakfast (Atrium of the EV Building) |
9:00 a.m |
Keynote: Mikhail Atallah, Purdue University (Room EV1.605,
EV Building.
Chair: Mourad Debbabi) |
10:00 a.m. |
Refreshment Break |
10:20 a.m. |
Security Track (Room EV1.615,
EV Building. Chair Carlisle Adams)
Sherif Saad, Issa Traore, Ali Ghorbani, Bassam Sayed, David Zhao, Wei Lu, John Felix and Payman Hakimian. Detecting P2P Botnets through Network Behavior Analysis and Machine Learning
Dakshita Khurana and Aditya Gaurav. Ensuring Tight Computational Security Against Higher-Order DPA Attacks
Nagajyothi Gunti, Weiqing Sun and Mohammed Niamat. I-RBAC:
Isolation Enabled Role-Based Access Control
Johannes Viehmann. Secure communication with secret sharing in static computer networks with partition in mistrust parties |
10:20 a.m. |
10:20-12:00 Privacy Track (Room EV1.605,
EV Building. Chair: Benjamin Fung)
Qi Xie and Urs Hengartner. Privacy-Preserving Matchmaking For Mobile Social Networking
Jens H. Weber-Jahnke and James Williams. Beyond Privacy Policies - Assessing Inherent Privacy Risks of Consumer Health Services
Alberto Vila Tena and Yrjö Raivio. Privacy Challenges of Open APIs: Case Location Based Services
Md. Moniruzzaman and Ken Barker. Delegation of access rights in a privacy preserving access control model |
12:00 p.m. |
Luncheon (Atrium of the LB
Building) |
2:00 p.m. |
Security Track (Room EV1.615,
EV Building. Chair: Esma Aïmeur )
Qian Yu and Chang N. Zhang. RC4 State and Its Applications
Paolo Gasti and Alessio Merlo. On Re-use of Randomness in Broadcast Encryption
Mohammad Parham and John William Atwood. Validation of Security for Participant Control Exchanges in Multicast Content Distribution
Samir Ouchani, Yosr Jarraya and Otmane Ait Mohamed. Model-Based Systems Security Quantification |
2:00 p.m. |
Privacy and Trust Track (Room EV1.605,
EV Building. Chair: Lingyu Wang)
Mahmoud Ghorbel, Armen Aghasaryan, Stéphane Betgé-Brezetz, Marie-Pascale Dupont, Guy-Bertrand Kamga and Sophie Piekarec. Privacy Data Envelope: Concept and Implementation
Naveed Ahmad, Haitham Cruickshank, Zhili Sun and Muhammad Asif. Pseudonymised Communication in Delay Tolerant Networks
Zainab M. Aljazzaf, Miriam A. M. Capretz and Mark Perry. Trust Bootstrapping Services and Service Providers |
4:00 p.m. |
Closing Remarks |
|