|
Catalunya campus of Universitat Rovira i Virgili |
Aula Magna |
Sala de Graus |
08:00-09:00 |
Registration |
09:00-09:15 |
Welcome address by the Rector of Universitat Rovira i Virgili,
the Conference Honorary Chair and the General Chairs |
|
09:15-10:15 |
Keynote Talk
"On the Need for Collaborative Research: Rationales and Examples" Marc Dacier (Symantec Research Labs)
|
|
10:15-10:45 |
Coffee Break |
10:45-11:30 |
"Challenges of Web Application Security" Vio Onut (IBM CAS Research / University of Ottawa) |
INTER-TRUST
- # "Inter-Trust motivation, requirements and user scenarios" J. Puiggalí and A. Skarmeta
- # "Privacy and security in the Inter-Trust policy negotiation model and use cases" O. Farràs
- # "Inter-Trust framework for security policy interoperability" N. and F. Cuppens
|
11:30-12:15 |
"Anatomy of a Privacy Code Review" Carmen Ruiz-Vicente (Google Inc.) |
12:15-14:00 |
Lunch |
14:00-16:00 |
Privacy I "Social networks and social media"
- #3
"Coalitional Games for the Management of Anonymous Access in Online Social Networks"
E. Palomar, A. Alcaide, E. Molina and Y. Zhang
- #50
"Allowing Privacy-Preserving Analysis of Social Network Likes"
F. Buccafurri, L. Fotia and G. Lax
- #129
"Aegis: A Semantic Implementation of Privacy as Contextual Integrity in Social Ecosystems"
I. Kayes and A. Iamnitchi
- #145
"How People Care about Their Personal Data Released on Social Media"
K. dos Santos Brito, F. Araujo Durao, V. Cardoso Garcia and S. Romero de Lemos Meira
|
Trust I "Trust and Crowds"
- #13
"Extended Structural Balance Theory for Modeling Trust in Social Networks"
Y. Qian and S. Adali
- #47
"TrustForge: Flexible Access Control for Collaborative Crowd-Sourced Environment"
J. Chang, P. Gebhard, A. Haeberlen, Z. Ives, I. Lee, O. Sokolsky and K. K. Venkatasubramanian
- #87
"Semi-Automated Assessment of Annotation Trustworthiness"
D. Ceolin, A. Nottamkandath and W. Fokkink
- #144
"Leveraging Platoon Dispersion for Sybil Detection in Vehicular Networks"
M. Al Mutaz, L. Malott and S. Chellappan
|
16:00-16:30 |
Coffee Break |
16:30-18:00 |
Privacy II "Cryptographic protocols"
- #17
"Key Privacy and Anonymous Protocols"
P. D'Arco and A. De Santis
- #89
"Traceability Analysis of Quadratic Residue-Based RFID Authentication Protocols"
Z. Sohrabi-Bonab, M. R. Alagheband and M. Reza Aref
- #131
"Pseudonymous Communications in Secure Industrial Wireless Sensor Networks"
N. Oualha
|
Security I "Access control"
-
#106
"Policy templates for relationship-based access control"
E. Aktoudianakis, J. Crampton, S. Schneider, H. Treharne and A. Waller
- #36
"Model-based Specification and Refinement of Usage Control Policies"
R. Neisse and J. Doerr
- #126
"A Provenance-based Access Control Model for Dynamic Separation of Duties"
D. Nguyen, J. Park and R. Sandhu
|
19:00 |
Roman Tarragona tour (Meeting point) |
|
Catalunya campus of Universitat Rovira i Virgili |
Aula Magna |
Sala de Graus |
08:45-09:00 |
Registration |
09:00-10:00 |
Keynote talk
"Digital Identity Protection - Concepts and Issues" Elisa Bertino (Purdue University, USA)
|
|
10:00-10:30 |
Coffee break |
10:30-12:30 |
Privacy III "Privacy preserving/enhancing technologies"
- #35
"Differential Privacy via t-Closeness in Data Publishing"
J. Soria-Comas and J. Domingo-Ferrer
- #68
"Blend me in: Privacy-Preserving Input Generalization for Personalized Online Services"
A. Baquero, A. Schiffman and J. Shrager
- #147
"Identifying Individual Vulnerability Based on Public Data"
J. Ferro, L. Singh and M. Sherr
- #149
"HALT: Hybrid Anonymization of Longitudinal Transactions"
M. Sehatkar and S. Matwin
|
Security II "Intrusion detection I"
- #61
"Targeted Attacks Detection With SPuNge"
M. Balduzzi, V. Ciangaglini and R. McArdle
- #80
"Voice Calls for Free: How the Black Market Establishes Free Phone Calls -- Trapped and Uncovered by a VoIP Honeynet"
M. Gruber, C. Schanes, F. Fankhauser and T. Grechenig
- #95
"The Role of Phone Numbers in Understanding Cyber-Crime Schemes"
A. Costin, J. Isacenkova, M. Balduzzi, A. Francillon and D. Balzarotti
- #125
"Error-Rate-based Fusion of Biometric Experts"
M. Ingwar, N. Ahmed and C. D. Jensen
|
12:30-14:00 |
Lunch |
14:00-16:00 |
Privacy IV "Privacy and location-based technologies and services"
- #21
"Selective Cloaking: Need-to-know for Location-based Apps"
B. Henne, C. Kater, M. Smith and M. Brenner
- #96
"Privacy-preserving Social Recommendations in Geosocial Networks"
B. Liu and U. Hengartner
- #55
"A Self-Adaptive Classification for the Dissociating Privacy Agent"
M. Juarez and V. Torra
- #134
"A Peer-to-Peer Agent Community for Digital Oblivion in Online Social Networks"
K. Stokes and N. Carlsson
|
Security III "Intrusion detection II"
- #15
"An NFC Based Consumer-Level Counterfeit Detection Framework"
M. Qasim-Saeed, Z. Bilal and C. Walter
- #140
"Writing down your password: Does it help?"
V. Boothroyd and S. Chiasson
- #75
"Contextual Feature Based One-Class Classifier Approach for Detecting Video Response Spam on YouTube"
V. Chaudhary and A. Sureka
- #31
"An Efficient and Provably-Secure Coercion-Resistant E-Voting Protocol"
A. Toroghi Haghighat, M. Sadeq Dousti and R. Jalili
|
16:00-16:30 |
Coffee Break |
16:30-18:10 |
Privacy V "Short Papers"
- #99
"Top-down Itemset Recoding for Releasing Private Complex Data"
T. Takahashi, K. Sobataka, T. Takenouchi, Y. Toyoda, T. Mori and T. Kohro
- #54
"Providing Useful and Private Web Search by Means of Social Network Profiling"
A. Viejo and D. Sánchez
- #141
"An implementation of secure multi-party computations to preserve privacy when processing EMR data"
A. Andersen
- #60
"Define Privacy-Preserving Setbase Drawer Size Standard: A ε-closeness Perspective"
B. Justus, F. Cuppens, N. Cuppens-Boulahia, J. Bringer, H. Chabanne and O. Cipiere
|
Security IV "Short Papers"
- #19
"Improving Security of Virtual Machines during Live Migrations"
S. Biedermann, M. Zittel and S. Katzenbeisser
- #94
"Real-time Malicious Fast-flux Detection Using DNS and Bot Related Features"
S. Martinez-Bea, S. Castillo-Perez and J. Garcia-Alfaro
|
Trust II "Short Papers"
- #9
"Towards Engineering Trust Systems: Template-Based, Component-Oriented Assembly"
S. Magin and S. Hauke
- #66
"Encouraging Second Thoughts: Obstructive User Interfaces for Raising Security Awareness"
T. Storer, S. Marsh, S. Noël, B. Esfandiari, K. El-Khatib, P. Briggs, K. Renaud and M. Vefa-Bicakci.
- #110
"Device Comfort for Mobile Heatlh Information Accessibility"
S. Marsh, Y. Wang, S. Noël, L. Robart, J. Stewart
|
20:00 |
Gala Dinner (Meeting point) |
|
Catalunya campus of Universitat Rovira i Virgili |
Aula Magna |
Sala de Graus |
09:00-10:00 |
Privacy VI "Cloud computing"
- #103
"A novel privacy preserving keyword searching for cloud storage"
L. Cheng, Q. Wen, Z. Jin and H. Zhang
- #111
"Secure Rendering Process in Cloud Computing"
M. Rizuan Baharon, Q. Shi, D. Llewellyn-Jones and M. Merabti
|
Security V "Cloud Computing"
- #120
"A Multi-Tenant RBAC Model for Collaborative Cloud Services"
B. Tang, Q. Li and R. Sandhu
- #49
"Design and Implementation of Multi-user Secure Indices for Encrypted Cloud Storage"
M. Lin, W. Hong, C. Chen and C. Cheng
|
10:00-10:30 |
Coffee break |
10:30-12:30 |
Trust III "Trust and Platforms"
- #48
"Efficient Polynomial Delegation Under Standard Assumptions"
P. Morillo and M. Obrador
- #67
"Socio-Technical Formal Analysis of TLS Certificate Validation in Modern Browsers"
G. Bella, R. Giustolisi and G. Lenzini
- #85
"Trust-based Decision-making for the Adaptation of Public Displays in Changing Social Contexts"
E. Kurdjokova, M. Wißner, S. Hammer and E. André
- #97
"Communicating Trustworthiness using Radar Graphs: A Detailed Look"
J. Nurse, I. Agrafiotis, S. Creese, M. Goldsmith and K. Lamberts
|
Security VI
- #18
"Hot-Patching a Web Server: a Case Study of ASAP Code Repair"
M. Payer and T. Gross
- #25
"SPIKE: A Novel Session Key Management Protocol with Time-Varying Secure Cluster Formation in Wireless Sensor Networks"
S. Sanyal
- #128
"Multi-data-types Interval Decision Diagrams for XACML Evaluation Engine"
C. Ngo, M. Makkes, Y. Demchenko and C. de Laat
- #146
"SSAS: A Simple Secure Addressing Scheme for IPv6 Autoconfiguration"
H. Rafiee and C. Meinel
|
12:30-13:00 |
Conclusions and farewell |
|
13:00-14:00 |
Lunch |