CALL FOR PARTICIPATION
----------------------------------------------------------------------
5th International Workshop on Security and Trust Management (STM 2009)
Saint Malo, France -- September 24-25, 2009
http://stm09.dti.unimi.it
----------------------------------------------------------------------
ABOUT THE CONFERENCE
STM (Security and Trust Management) is a established working group of
ERCIM (European Research Consortium in Informatics and Mathematics).
STM 2009 is the fifth workshop in this series and will be held in
Saint Malo, France, in conjunction with ESORICS 2009 (14th European
Symposium on Research in Computer Security). STM has the following aims:
- to investigate the foundations and applications of security and trust
in ICT;
- to study the deep interplay between trust management and common security
issues such as confidentiality, integrity, and availability;
- to identify and promote new areas of research connected with security
management (e.g. dynamic and mobile coalition management, P2P, MANETs,
Web/GRID services);
- to identify and promote new areas of research connected with trust
management (e.g., reputation, recommendation, and collaboration);
- to provide a platform for presenting and discussing emerging ideas and
trends.
The 5th Security and Trust Management Workshop (STM 2009) will be held
in Saint Malo, France.
REGISTRATION
Registration information is available at
http://stm09.dti.unimi.it/registration.php
PROGRAM
September 24, 2009
------------------
9:00 - 10:30 Business meeting
10:30 - 11:00 Coffee break
11:00 - 12:00 Invited talk - TBA
12:00 - 12:30 INFORMATION SECURITY MANAGEMENT
- Information Security Management: A Collaborative Approach
Frank Innerhofer-Oberperfler, Daniel Bachlechner, Ronald Maier,
Verena Hahn, Manuela Weitlaner, and Ruth Breu
12:30 - 14:00 Lunch
14:00 - 15:30 SOCIAL NETWORKS AND TRUST
- A Measurement of Mixing Time in Social Networks
Matteo Dell'Amico and Yves Roudier
- Resource access in Multi-Provider Networks using Role Based
Trust Management
Paolo Mori, Maurizio Colombo, Fabio Martinelli, Barbara Martini,
Fabio Baroncelli, and Piero Castoldi
- Distinguishing Fact and Fiction: Data Mining Online Identities
Roya Feizy, Ian Wakeman, and Dan Chalmers
15:30 - 16:00 Coffee break
16:00 - 17:30 CRYPTOGRAPHY, PRIVACY AND LANGUAGE-BASED SECURITY
- Experimenting with Distributed Generation of RSA Keys
Thierry Congos and Francois Lesueur
- Protecting Mobile Code Privacy With Resilient Spy Agent Group Testing
Georgios Kalogridis
- Optimizing IRM with Automata Modulo Theory
Fabio Massacci and Ida Sri Rejeki Siahaan
September 25, 2009
------------------
9:00 - 10:00 Invited talk
- Thesis on Security and Trust management
Claudio A. Ardagna - ERCIM STM WG award for the best Ph.D.
10:00 - 10:30 REPUTATION MANAGEMENT
- Challenges for Robust Trust and Reputation Systems
Audun Josang and Jennifer Golbeck
10:30 - 11:00 Coffee break
11:00 - 12:30 ACCESS CONTROL AND USAGE CONTROL
- A Multimodal view on Access Control and Trust Management:
Fibred Security Language
Guido Boella, Dov M. Gabbay, Valerio Genovese,
and Leendert van der Torre
- Detecting and Countering Insider Threats: Can Policy-Based
Access Control Help?
Jason Crampton and Michael Huth
- Usage Control Enforcement with Data Flow Tracking for X11
Alexander Pretschner, Matthias Buchler, Matus Harvan,
Christian Schaefer, and Thomas Walter
MORE INFORMATION
Additional information about the conference can be found at
http://stm09.dti.unimi.it/
_______________________________________________
Tccc mailing list
Tccc@lists.cs.columbia.edu
https://lists.cs.columbia.edu/cucslists/listinfo/tccc
No comments:
Post a Comment