Program
Thursday 23th of September
Session 1 Access
Control: 9:00-
11:00
An Auto-Delegation
Mechanism for Access Control Systems.
Jason Crampton and Charles Morisset
Automated Analysis
of
ARBAC Policies.
Alessandro Armando and Silvio Ranise
Influence of
Attribute Freshness on Decision Making in
Usage Control.
Leanid Krautsevich, Aliaksandr
Lazouski, Fabio Martinelli and Artsiom Yautsiukhin
Rewrite
Specifications of Access Control Policies in
Distributed Environments.
Clara Bertolissi and Maribel Fernandez
Coffee Break
Session 2 Trust
Management I:
11:30-12:30
A Case Study in
Decentralized, Dynamic,
Policy-Based,
Authorization and Trust Management-
Automated
Software Distribution for
Airplanes.
Monika Maidl, David von Oheimb, Peter
Hartmann and Richard
Robinson
GUTS: A
Framework for Adaptive and Configureable
Grid User Trust Service.
Ioanna Dionysiou, Harald Gjermundrod and
David E. Bakken
Invited Talk.
12:30-13:30
Keynote lecture EUROPKI'10:
Data Privacy in Outsourcing Scenarios
Pierangela
Samarati, Department of
Information Technologies, University of Milan
Lunch
Session 3 Trust
Management II:
14:30-16:00
Aggregating Trust
Using Triangular Norms in the KeyNote
Trust Management System.
Simon Foley, Wayne Mac Adams and Barry
O'Sullivan
An Authentication
Trust
Metric for Federated Identity
Management Systems.
Hidehito Gomi
A Trust-Augmented
Voting Scheme for Collaborative
Privacy Management.
Yanjie Sun, Chenyi Zhang, Jun Pang,
Baptiste Alcalde and Sjouke Mauw
Coffee Break
Invited Talk:
16:30-17:30
Keynote lecture STM'10: European Commission,
Trust & Security Unit
Trust and Security - a European policy
Gustav
Kalbe, Deputy Head of Unit -
Trust & Security, European Commission.
STM Working Group
Meeting:
17:30-18:30
Gala Dinner. 20:30
Friday
24th
of
September
Invited Talk:
9:00-10:00
Keynote lecture CRITIS'10:
Enhancing Europe's Critical Information
Infrastructures
Udo
Helmbrecht,
ENISA
Session 4. Security
Protocols:
10:00-11:00
Universally
Composable NIZK Protocol in an Internet
Voting Scheme.
Md. Abdul Based and Stig Frode Mjølsnes
Protocol Analysis
Modulo Combination of Theories: A Case
Study in Maude-NPA.
Ralf Sasse, Santiago Escobar, Jose
Meseguer and
Catherine Meadows
Coffee Break
PhD Thesis ERCIM Award
Talk:
11:30-12:30
Preserving
Privacy
in Data Outsourcing
Sara Foresti,
University
of
Milan
Invited Talk:
12:30-13:30
Keynote lecture STM'10:
The mess we are
in - the past, present, and future of Web Security
Martin Johns, SAP
Research
Lunch
Session 5.
Information Analysis and Data Control: 14:30 -
16:00
Defamation-Free
Networks through User-Centered Data
Control.
Nadim Sarrouh, Florian Eilers, Uwe
Nestmann and Ina Schieferdecker
DeCover:
Information
Flow Analysis of Business Processes
for Condentiality Requirements.
Rafael Accorsi and
Claus Wonnemann
Stateful
Authorization Logic - Proof Theory and A Case
Study.
Deepak Garg and Frank Pfenning
Coffee Break
Session 6. Privacy
Enhancing Techniques:
16:30-18:00
Privacy-friendly
Energy-metering via Homomorphic
Encryption.
Flavio D. Garcia and Bart Jacobs
Extending an RFID
Security and Privacy Model by
Considering Forward Untraceability.
Mete Akgün and Mehmet Ufuk Çağlayan
Protecting privacy
of
sensitive value distributions in
data release.
Michele Bezzi, Sabrina De Capitani di
Vimercati, Giovanni Livraga and Pierangela Samarati