PST top
Call for Papers
Important Dates
    - Organizing
    - Technical Program
Privacy Theme
Security Theme
Trust Theme
Workshops & Tutorials
Conference Venue &
Travel Information
Paper Submission
Innovation Day
Partnership / Sponsorship









Tenth Annual Conference on
Privacy, Security and Trust

July 16-18, 2012,
Institut MINES-TELECOM, Paris,France

(Outline Agenda) : Download the Program

Day 1: July 16th (Innovation Day)
8:00 - 8:45


Welcome (Room: B310)
8:45 - 9:00

Philippe Letellier, Institut Mines-Telecom
Eric Diehl, Technicolor

Keynote Session (Room: B310)
9:00 - 10:00

Eric Freyssinet, Head of the cybercrime division, Judiciary pole of the gendarmerie nationale
Title: Today's challenges of cybercrime

Break & Demonstrations (Room: Hall)
Session: Cyber Defense (Room: B310)
Chair: Louis Granboulan
10:30 - 12:00


  • David Bizeul, EADS Cassidian
  • Olivier Caleff, Devoteam
  • Yann Le Borgne, Sourcefire

Panel: Cyber Defense (Room: B310)
12:00 - 12:30


  • EADS Cassidian
  • Devoteam
  • Sourcefire
Moderator: Louis Granboulan, EADS Cassidian

Lunch (Room: E200)
Keynote Session (Room: B310)
14:00 - 15:00

Ravi SANDHU, University of Texas at San Antonio
Title : The Authorization Leap from Rights to Attributes: Maturation or Chaos?

Session: Innovation & SME (Room: B310)
Chair: Philippe Letellier
15:00 - 16:30


  • Stéphane Morocci, SWID
  • Philippe Nguyen, Secure-IC
  • Rikke Kuipers, Codenomicon
  • Mark Noctor, Arxan
  • Philippe Letellier, ITEA

Break & Demonstrations (Room: Hall)
Panel: Which business on security for SMEs? (Room: B310)
17:30 - 18:30


  • SWID
  • Secure-IC
  • Codenomicon
  • Arxan
  • ITEA
Moderator: Eric Diehl, Technicolor

Cocktail (Room: E200)
19:30 Networking Cocktail

Day 1: July 16th (TSOS Workshop) - Room B312

The programme of the workshop is available here

Day 2: July 17th
8:45 - 9:00


Keynote Session (Room: B310)
Chair: Frédéric Cuppens
9:00 - 10:00

Josep Domingo-Ferrer, Universitat Rovira i Virgili
Rational Co-operation for Privacy, Security and Functionality in the Information Society

Break (Room: B316)
Parallel sessions
Privacy (Room: B310)
Chair: Carlisle Adams
Trust (Room: B312)
Chair: Jennifer Golbeck
10:30 - 12:30 Privacy
Session 1

Alexandre Viejo, Jordi Castellà-Roca, Oriol Bernadó and Josep M. Mateo-Sanz.
Single-Party Private Web Search

Gianpiero Costantino, Fabio Martinelli, Paolo Santi and Dario Amoruso.
An Implementation of Secure Two-Party Computation for Smartphones with Application to Privacy-Preserving Interest-Cast

Marian Harbach, Sascha Fahl, Michael Brenner, Thomas Muders and Matthew Smith.
Towards Privacy-Preserving Access Control with Hidden Policies, Hidden Credentials and Hidden Decisions

Arun Prakash Kumara Krishnan and Bon Sy.
SIPPA-2.0 - Secure Information Processing with Privacy Assurance (version 2.0)

Session 1

Mehrdad Nojoumian and Douglas R. Stinson.
Social Secret Sharing in Cloud Computing Using a New Trust Function

Huiying Duan and Peng Yang.
Building Robust Reputation Systems for Travel-related Services

Kasper Lindberg and Christian Damsgaard Jensen.
Collaborative Trust Evaluation for Wiki Security

Johannes Viehmann.
The Theory of Creating Trust with a Set of Mistrust-Parties

Lunch (Room: E200)
Parallel sessions
Security (Room: B310)
Chair: Ali Ghorbani
Trust (Room: B312)
Chair: Samiha Ayed
14:00 - 16:00 Security
Session 1

Kami Vaniea, Lujo Bauer, Lorrie Faith Cranor and Mike Reiter.
Out of sight, out of mind: Effects of displaying access-control information near the item it controls

Shushan Zhao, Robert Ken and Akshai Aggarwal.
An Integrated Key Management and Secure Routing Framework for Mobile Ad-hoc Networks

Florian Schmitt, Jan Gassen and Elmar Gerhards-Padilla.
PDF Scrutinizer: Detecting JavaScript-based Attacks in PDF Documents

Yusuke Takamatsu, Yuji Kosuga and Kono Kenji.
Automated Detection of Session Management Vulnerabilities in Web Applications

Session 2
(short papers)

Anirban Basu, Natasha Dwyer and Stephen Naicken.
A concordance framework for building trust evidences

Jennifer Golbeck, Hal Warren and Eva Winer.
Making Trusted Attribute Assertions Online with the Publish Trust Framework

Cody Buntain, Jennifer Golbeck, Dana Nau and Sarit Kraus.
Advice and Trust in Games of Choice

Mark Vinkovits.
Towards Requirements for Trust Management (Position paper)

Break (Room: B316)
Parallel sessions
Short papers 1 (Room: B310)
Chair: Joaquin Garcia-Alfaro
Short papers 2 (Room: B312)
Chair: Béchir Ktari
16:30 - 17:40 Short
papers 1

Muyiwa Olurin, Carlisle Adams and Luigi Logrippo.
Platform for Privacy Preferences: Description, Current Status, and Future Directions (Position paper)

Manuel Lafond, Pierre-Olivier Brosseau and Esma Aimeur.
Privacy Invasion in Business Environments

Ali Noman and Carlisle Adams.
DLAS: Data Location Assurance Service for Cloud Computing Environments

papers 2

Ivan Studnia, Vincent Nicomette, Mohamed Kaâniche and Eric Alata.
A distributed platform of high interaction honeypots and experimental results

Said Marouf, Mohamed Shehab and Adharsh Desikan.
REM: A Runtime Browser Extension Manager with Fine-Grained Access Control

Julien Bringer, Herve Chabanne and Olivier Cipière.
Combining the Setbase Approach with Negative Databases (Position paper)


Gala dinner

Day 3: July 18th
Keynote Session (Room: B310)
Chair: Nora Cuppens
9:00 - 10:00

Luigi Logrippo, University of Ottawa
Conformance to legal requirements: The last frontier for privacy research

Break (Room: B316)
Parallel sessions
Privacy (Room: B310)
Chair: Esma Aimeur
Security (Room: B312)
Chair: Philip Fong
10:30 - 12:30 Privacy
Session 2

Aditi Ramachandran, Lisa Singh, Edward Porter and Frank Nagle.
Exploring Re-identification Risks in Public Domains

Denzil Correa, Ashish Sureka and Raghav Sethi.
Preserving WhACKy! - What Anyone Could Know About You from Twitter

Francesco Buccafurri, Lidia Fotia and Gianluca Lax.
Privacy-Preserving Resource Evaluation in Social Networks

Benjamin Nguyen, Nicolas Anciaux and Michalis Vazirgiannis.
Limiting Data Collection in Application Forms: A real-case application of a Founding Privacy Principle

Session 2

Hanine Tout, Azzam Mourad, Hamdi Yahyaoui and Chamseddine Talhi.
Towards a BPEL Model-Driven Approach for Web Services Security

Daniel Leblanc and Robert Biddle.
Risk Perception of Internet-Related Activities

Jaehong Park, Dang Nguyen and Ravi Sandhu.
A Provenance-based Access Control Model

Liang Chen, Jason Crampton, Martin J. Kollingbaum and Timothy J. Norman.
Obligations in Risk-Aware Access Control

Lunch (Room: E200)
Parallel sessions
Privacy (Room: B310)
Chair: Ana Cavalli
Trust (Room: B312)
Chair: Christian Damsgaard Jensen
14:00 - 15:30 Privacy
Session 3

Yasser Jafer, Herna Viktor and Eric Paquet.
Aggregation and Privacy in Multi-Relational Databases

Slim Trabelsi and Jakub Sendor.
Sticky Policies for Data Control in the Cloud

Fatema Rashid, Ali Miri and Isaac Woungang.
A Secure Data Deduplication Framework for Cloud Environments

Session 3

Ayman Tajeddine, Ali Chehab and Ayman Kayssi.
CENTER: A Centralized Trust-Based Efficient Routing Protocol for Wireless Sensor Networks

Audun Josang, Kent A. Varmedal, Christophe Rosenberger and Rajendra Kumar.
Service Provider Authentication Assurance

Jonathan Lung.
Ethical and Legal Considerations of reCAPTCHA

15:30 - 16:00

Conclusion and farewell



Call for Papers | Important Dates | Organizing Committee | Technical Program Committee | Privacy Theme | Security Theme | Trust Theme | Workshops & Tutorials |Accommodations, Conference Venue & Travel Information | Paper Submission | Innovation Day Program | Registration | Partnership / Sponsorship | Speakers | Home
Copyright © 2004 - 2012 "". All Rights Reserved.
last revised June 08, 2012