spacer
spacer
spacer
spacer

25th International Information Security Conference (SEC 2010):

Security & Privacy − Silver Linings in the Cloud

(20.09.2010 23.09.2010)

 

Please find the General SEC 2010 Page here

 

Download Programm as PDF

 

spacer
Monday, 20th September

spacer

Kristian Beckman Award Awardee Keynote
Session Chair: Kai Rannenberg, Vijay Varadharajan, Louise Yngstrm

The 5 Waves of Information Security From Kristian Beckman to the Present

(11:30-12:30)

Presenter: SH (Basie) von Solms

 

 

Security Management
Session Chair: Carlos Rieder

A Business Continuity Management Simulator

(13:30-14:00)

 

Presenter: Lam-for Kwok

Dennis Longley, William J. Caelli

Mining Business-Relevant RBAC States Through Decomposition

(14:00-14:30)

Presenter: Alessandro Colantonio

Roberto Di Pietro, Alberto Ocello, Nino Vincenzo Verde

Group Dynamics in a Security Risk Management Context:

A Teaching Case Study

(14:30-15:00)

 

Presenter: Stewart Kowalski

Rostyslav Barabanov

 

 

Security Management & Governance
Session Chair: Christian Weber

Using Actor Network Theory to Understand Information Security Management

(16:00-16:30)

Presenter: Karin Hedstrm

Gurpreet Dhillon, Fredrik Karlsson

Information Security Governance: When Compliance Becomes more Important than Security

(16:30-17:00)

Presenter: Atif Ahmad

Terence Tan, Anthonie B. Ruighaver

spacer
spacer
spacer
spacer

SEC 2010 (20.09.2010 23.09.2010)

spacer
Tuesday, 21st September

spacer

Network Security & Authentication
Session Chair: Siraj Shaikh

Understanding Domain Registration Abuses

(10:30-11:00)

Presenter: Scott E. Coull

Andrew M. White, Ting-Fang Yen, Fabian Monrose, Michael K. Reiter

Who On Earth Is Mr. Cypher: Automated Friend Injection Attacks on Social Networking Sites

(11:00-11:30)

Presenter: Markus Huber

Martin Mulazzani, Edgar Weippl

Authentic Refinement of Semantically Enhanced Policies in Pervasive Systems

(11:30-12:00)

Presenter: Julian Schtte

Nicolai Kuntze, Andreas Fuchs, Atta Badii

Mobile Qualified Server Signature

(12:00-12:30)

Presenter: Clemens Orthacker

Martin Centner, Christian Kittl

 

 

Intrusion Detection, Trust Management and Models
Session Chair: Vijay Varadharajan

Fraud Detection in ERP Systems using Scenario Matching

(13:30-14:00)

Presenter: Malcom Corney

Asadul Khandoker Islam, George Mohay, Andrew Clark, Shane Bracher,  Tobias Raub, Ulrich Flegel

Use of IP Addresses for High Rate Flooding Attack Detection

(14:00-14:30)

Presenter: Ejaz Ahmed

George Mohay, Alan Tickle, Sajal Bhatia

Augmenting Reputation-based Trust Metrics with Rumor-like Dissemination of Reputation Information

(14:30-15:00)

Presenter: Sascha Hauke

 Martin Pyka, Markus Borschbach, Dominik Heider

Ex-SDF: An Extended Service Dependency Framework For Intrusion Impact Assessment

(15:00-15:30)

Presenter: Nizar Kheir

Nora Cuppens-Boulahia, Frdric Cuppens, Herv Debar

spacer
spacer
spacer
spacer

SEC 2010 (20.09.2010 23.09.2010)

spacer
Wednesday, 22nd September

spacer

Software Security and Assurance
Session Chair: Rossouw von Solms

A Dynamic and Ubiquitous Smart Card Security Assurance and Validation Mechanism

(10:30-11:00)

Presenter: Raja Naeem Akram

Konstantinos Markantonakis, Keith Mayes

On-the-fly Inlining of Dynamic Security Monitors

(11:00-11:30)

Presenter: Alejandro Russo

Jonas Magazinius, Andrei Sabelfeld

A Metric-Based Scheme for Evaluating Tamper Resistant Software Systems

(11:30-12:00)

Presenter: Hongxia Jin

Gideon Myles

Evaluation of the Offensive Approach in Information Security Education

(12:00-12:30)

Presenter: Martin Mink

Rainer Greifeneder

 

 

Panel
Session Chair: Rossouw von Solms

Panelist:
Johan van Niekerk, Louise Yngstrom, Bill Caelli

Research Methodologies in Information Security Research: The Road Ahead

(13:30-15:30)

Presenter: Johan van Niekerk, Rossouw von Solms

spacer
spacer
spacer
spacer

SEC 2010 (20.09.2010 23.09.2010)

spacer
Thursday, 23rd September

spacer

Access Control & Privacy
Session Chair: Yves Deswarte

Purpose-based access control policies and conflicting analysis

(10:30-11:00)

Presenter: Hua Wang

Lili Sun, Vijay Varadharajan

Delegation in Predicate Encryption Supporting Disjunctive Queries

(11:00-11:30)

Presenter: Dongdong Sun

Colin Boyd, Juan Manuel Gonzalez Nieto

Tagging Disclosures of Personal Data to Third Parties to Preserve Privacy

(11:30-12:00)

Presenter: Sven Wohlgemuth

Isao Echizen, Noboru Sonehara, Gnter Mller

k-Shares: A Privacy Preserving Reputation Protocol for Decentralized Environments

(12:00-12:30)

Presenter: Omar Hasan

Lionel Brunie, Elisa Bertino

 

 

Privacy
Session Chair: Jaap-Henk Hoepman

Towards Fair Indictment for Data Collection with Self-Enforcing Privacy

(13:30-14:00)

Presenter: Mark Stegelmann

How to enhance Privacy and Identity Management for Mobile Communities Approach and User driven Concepts of the PICOS Project

(14:00-14:30)

Presenter: Christian Kahl

Katja Bttcher, Markus Tschersich, Stephan Heim, Kai Rannenberg

Performance Analysis of Accumulator-based Revocation Mechanisms

(14:30-15:00)

Presenter: Jorn Lapon

Markulf Kohlweiss, Bart De Decker, Vincent Naessens

 

 

Closing
Session Chair: Rossouw von Solms, Collin

gipoco.com is neither affiliated with the authors of this page nor responsible for its contents. This is a safe-cache copy of the original web site.