Program


    Thursday 23th of September


    Session 1 Access Control: 9:00- 11:00

    An Auto-Delegation Mechanism for Access Control Systems.
    Jason Crampton and Charles Morisset

    Automated Analysis of ARBAC Policies.
    Alessandro Armando and Silvio Ranise 

    Influence of Attribute Freshness on Decision Making in Usage Control.
    Leanid Krautsevich, Aliaksandr Lazouski, Fabio Martinelli and Artsiom Yautsiukhin

    Rewrite Specifications of Access Control Policies in Distributed Environments.
    Clara Bertolissi and Maribel Fernandez

    Coffee Break

    Session 2 Trust Management I: 11:30-12:30

    A Case Study in Decentralized, Dynamic, Policy-Based, Authorization and Trust Management-          Automated Software Distribution for Airplanes.
    Monika Maidl, David von Oheimb, Peter Hartmann and Richard Robinson

    GUTS: A Framework for Adaptive and Configureable Grid User Trust Service.
    Ioanna Dionysiou, Harald Gjermundrod and David E. Bakken

    Invited Talk. 12:30-13:30

    Keynote lecture EUROPKI'10: 
    Data Privacy in Outsourcing Scenarios
    Pierangela Samarati, Department of Information Technologies, University of Milan

    Lunch

    Session 3 Trust Management II: 14:30-16:00

    Aggregating Trust Using Triangular Norms in the KeyNote Trust Management System.
    Simon Foley, Wayne Mac Adams and Barry O'Sullivan

    An Authentication Trust Metric for Federated Identity Management Systems.
    Hidehito Gomi

    A Trust-Augmented Voting Scheme for Collaborative Privacy Management.
    Yanjie Sun, Chenyi Zhang, Jun Pang, Baptiste Alcalde and Sjouke Mauw

    Coffee Break

    Invited Talk: 16:30-17:30

    Keynote lecture STM'10:  European Commission, Trust & Security Unit
   
    Trust and Security - a European policy
    Gustav Kalbe, Deputy Head of Unit - Trust & Security, European Commission.


    STM Working Group Meeting: 17:30-18:30

    Gala Dinner. 20:30


    Friday 24th of September

    Invited Talk: 9:00-10:00

    Keynote lecture CRITIS'10: 
    Enhancing Europe's Critical Information Infrastructures
    Udo Helmbrecht, ENISA

    Session 4. Security Protocols: 10:00-11:00

    Universally Composable NIZK Protocol in an Internet Voting Scheme.
    Md. Abdul Based and Stig Frode Mjølsnes

    Protocol Analysis Modulo Combination of Theories: A Case Study in Maude-NPA.
    Ralf Sasse, Santiago Escobar, Jose Meseguer and Catherine Meadows

   Coffee Break

   PhD Thesis ERCIM Award Talk: 11:30-12:30
  
    Preserving Privacy in Data Outsourcing
    Sara Foresti, University of Milan

    Invited Talk: 12:30-13:30

    Keynote lecture STM'10:
    The mess we are in - the past, present, and future of Web Security
    Martin Johns, SAP Research

    Lunch

    Session 5. Information Analysis and Data Control: 14:30 - 16:00

    Defamation-Free Networks through User-Centered Data Control.
    Nadim Sarrouh, Florian Eilers, Uwe Nestmann and Ina Schieferdecker

    DeCover: Information Flow Analysis of Business Processes for Condentiality Requirements.             Rafael Accorsi and Claus Wonnemann

    Stateful Authorization Logic - Proof Theory and A Case Study.
    Deepak Garg and Frank Pfenning

    Coffee Break

    Session 6. Privacy Enhancing Techniques: 16:30-18:00

    Privacy-friendly Energy-metering via Homomorphic Encryption.
    Flavio D. Garcia and Bart Jacobs

    Extending an RFID Security and Privacy Model by Considering Forward Untraceability.
    Mete Akgün and Mehmet Ufuk Çağlayan

    Protecting privacy of sensitive value distributions in data release.
    Michele Bezzi, Sabrina De Capitani di Vimercati, Giovanni Livraga and Pierangela Samarati