[PET] Call for Participation - 11th International Workshop on Security and Trust Management (STM 2015)

STM 2015 stm2015 at unimi.it
Wed Aug 5 18:38:21 BST 2015


CALL FOR PARTICIPATION

******************************************************************************
11th International Workshop on Security and Trust Management (STM 2015)
Vienna, Austria - September 21-22, 2015
http://stm2015.di.unimi.it
******************************************************************************

** Register by August 31, 2015 to enjoy the early bird discount! **
** Group discounts available! **

ABOUT THE WORKSHOP
STM (Security and Trust Management) is a working group of ERCIM
(European Research Consortium in Informatics and Mathematics).
STM 2015 is the eleventh workshop in this series and will be held
in Vienna, Austria, in conjunction with the 20th European 
Symposium On Research in Computer Security (ESORICS 2015).

The workshop will be a 2-day event, featuring technical presentations
of 15 full papers and 4 short papers. 


REGISTRATION
Registration information is available at:
http://esorics2015.sba-research.org/venue/registration/
Early registration fees apply until August 31, 2015.



PROGRAM

Monday, September 21, 2015
--------------------------

 8.45 -  9.00  Welcome and opening
 
 9.00 - 10.30  Session 1 - Security metrics and classification
- Digital Waste Sorting: A Goal-Based, Self-Learning Approach to Label Spam 
  Email Campaigns
  (Mina Sheikhalishai, Andrea Saracino, Mohamed Mejri, Nadia Tawbi and Fabio 
  Martinelli)

- Integrating Privacy and Safety Criteria into Planning Tasks
  (Anna Lavygina, Alessandra Russo and Naranker Dulay)

- Security Metrics, Secure Elements, and Operational Measurement Trust in 
  Cloud Environments
  (Teemu Kanstren and Antti Evesti)

10.30 - 11.00  Coffee break

11.00 - 12.30  Session 2: data protection
- A Declarative Framework for Specifying and Enforcing Purpose-aware Policies
  (Riccardo De Masellis, Chiara Ghidini and Silvio Ranise) 

- How to Trust the Re-Use of Data
  (Erisa Karafili, Hanne Riis Nielson and Flemming Nielson)

- Towards Balancing Privacy and Efficiency: A Principal-Agent Model of 
  Data-Centric Business
  (Christian Zimmermann and Claus-Georg Nolte)
    
12.30 - 14.00  Lunch

14.00 - 15.30  Session 3: intrusion detection and software vulnerabilities
- The AC-Index: Fast Online Detection of Correlated Alerts
  (Andrea Pugliese, Antonino Rullo and Antonio Piccolo)

- Intrusion Detection System for Applications using Linux Containers
  (Amr Abed, Charles Clancy and David Levy)

- SUDUTA: Script UAF Detection Using Taint Analysis
  (John Galea and Mark Vella)
      
15.30 - 16.00  Coffee break

16.00 - 17.00  Session 4: PhD award

17.00          Business meeting

---------------------------------------------------------------------
Tuesday, September 22, 2015
---------------------------

 9.00 - 10.30  Session 5: cryptographic protocols
- Two-Factor Authentication for the Bitcoin Protocol
  (Christopher Mann and Daniel Loebenberger)
   
- Private Proximity Testing on Steroids: An NTRU-based protocol
  (Constantinos Patsakis, Panayiotis Kotzanikolaou and Mélanie Bouroche) 

- Selecting a New Key Derivation Function for Disk Encryption
  (Milan Broz and Vashek Matyas)
 
10.30 - 11.00  Coffee break

11.00 - 12.30  Session 6: Controlling data release

- It's My Privilege: Controlling Downgrading in DC-Labels
  (Pablo Buiras, Daniel King, Lucas Waye, Stephen Chong and Alejandro Russo)

- Obligations in PTaCL
  (Conrad Williams and Jason Crampton)
  
- Content and Key Management to Trace Traitors in Broadcasting Services
  (Kazuto Ogawa, Goichiro Hanaoka and Hideki Imai)
  
12.30 - 13.50  Lunch

13.50 - 15.30  Session 7: Security Analysis, Risk Management, and Usability
- In Cyber-Space, no One Can Hear You S·CREAM: A Root Cause Analysis
  Technique for Socio-Technical Security 
  (Ana Ferreira, Jean-Louis Huynen, Vincent Koenig and Gabriele Lenzini) 

- A Socio-Technical Investigation into Smartphone Security
  (Melanie Volkamer, Karen Renaud, Oksana Kulyk, and Sinem Emeroz)

- A Game Theoretic Framework for Modeling Adversarial Cyber Security Game
  among Attackers, Defenders, and Users
  (Tatyana Ryutov, Michael Orosz, Detlof von Winterfeldt and Jim Blythe)

- Design, Demonstration, and Evaluation of An Information Security Contract 
  and Trading Mechanism to Hedge Information Security Risks
  (Pankaj Pandey and Steven De Haes)

16.00 - 16.30  Coffee break
****************
Per destinare il 5x1000 all'Universita' degli Studi di Milano: indicare nella dichiarazione dei redditi il codice fiscale 80012650158.

http://www.unimi.it/13084.htm?utm_source=firmaMail&utm_medium=email&utm_content=linkFirmaEmail&utm_campaign=5xmille



More information about the PET mailing list