World Computer Congress - Brisbane 2010

Main navigation

World Computer Congress - Brisbane 2010

Trust IT

International Information Security Conference (SEC 2010): Security & Privacy - Silver Linings in the Cloud

Program

(20.09.2010 – 23.09.2010)

Please find the General SEC 2010 Page here

Download Programm as PDF


Monday, 20th September


Kristian Beckman Award Awardee Keynote
Session Chair: Kai Rannenberg, Vijay Varadharajan, Louise Yngström

The 5 Waves of Information Security – From Kristian Beckman to the Present

(11:30-12:30)

Presenter: SH (Basie) von Solms

 

Security Management
Session Chair: Carlos Rieder

A Business Continuity Management Simulator

(13:30-14:00)

 

Presenter: Lam-for Kwok

Dennis Longley, William J. Caelli

Mining Business-Relevant RBAC States Through Decomposition

(14:00-14:30)

Presenter: Alessandro Colantonio

Roberto Di Pietro, Alberto Ocello, Nino Vincenzo Verde

Group Dynamics in a Security Risk Management Context:

A Teaching Case Study

(14:30-15:00)

 

Presenter: Stewart Kowalski

Rostyslav Barabanov

 

Security Management & Governance
Session Chair: Christian Weber

Using Actor Network Theory to Understand Information Security Management

(16:00-16:30)

Presenter: Karin Hedström

Gurpreet Dhillon, Fredrik Karlsson

Information Security Governance: When Compliance Becomes more Important than Security

(16:30-17:00)

Presenter: Atif Ahmad

Terence Tan, Anthonie B. Ruighaver




SEC 2010 (20.09.2010 – 23.09.2010)


Tuesday, 21st September


Network Security & Authentication
Session Chair: Siraj Shaikh

Understanding Domain Registration Abuses

(10:30-11:00)

Presenter: Scott E. Coull

Andrew M. White, Ting-Fang Yen, Fabian Monrose, Michael K. Reiter

Who On Earth Is ”Mr. Cypher“: Automated Friend Injection Attacks on Social Networking Sites

(11:00-11:30)

Presenter: Markus Huber

Martin Mulazzani, Edgar Weippl

Authentic Refinement of Semantically Enhanced Policies in Pervasive Systems

(11:30-12:00)

Presenter: Julian Schütte

Nicolai Kuntze, Andreas Fuchs, Atta Badii

Mobile Qualified Server Signature

(12:00-12:30)

Presenter: Clemens Orthacker

Martin Centner, Christian Kittl

 

Intrusion Detection, Trust Management and Models
Session Chair: Vijay Varadharajan

Fraud Detection in ERP Systems using Scenario Matching

(13:30-14:00)

Presenter: Malcom Corney

Asadul Khandoker Islam, George Mohay, Andrew Clark, Shane Bracher,  Tobias Raub, Ulrich Flegel

Use of IP Addresses for High Rate Flooding Attack Detection

(14:00-14:30)

Presenter: Ejaz Ahmed

George Mohay, Alan Tickle, Sajal Bhatia

Augmenting Reputation-based Trust Metrics with Rumor-like Dissemination of Reputation Information

(14:30-15:00)

Presenter: Sascha Hauke

 Martin Pyka, Markus Borschbach, Dominik Heider

Ex-SDF: An Extended Service Dependency Framework For Intrusion Impact Assessment

(15:00-15:30)

Presenter: Nizar Kheir

Nora Cuppens-Boulahia, Frédéric Cuppens, Hervé Debar




SEC 2010 (20.09.2010 – 23.09.2010)


Wednesday, 22nd September


Software Security and Assurance
Session Chair: Rossouw von Solms

A Dynamic and Ubiquitous Smart Card Security Assurance and Validation Mechanism

(10:30-11:00)

Presenter: Raja Naeem Akram

Konstantinos Markantonakis, Keith Mayes

On-the-fly Inlining of Dynamic Security Monitors

(11:00-11:30)

Presenter: Alejandro Russo

Jonas Magazinius, Andrei Sabelfeld

A Metric-Based Scheme for Evaluating Tamper Resistant Software Systems

(11:30-12:00)

Presenter: Hongxia Jin

Gideon Myles

Evaluation of the Offensive Approach in Information Security Education

(12:00-12:30)

Presenter: Martin Mink

Rainer Greifeneder

 

Panel
Session Chair: Rossouw von Solms

Panelist:
Johan van Niekerk, Louise Yngstrom, Bill Caelli

Research Methodologies in Information Security Research: The Road Ahead

(13:30-15:30)

Presenter: Johan van Niekerk, Rossouw von Solms




SEC 2010 (20.09.2010 – 23.09.2010)


Thursday, 23rd September


Access Control & Privacy
Session Chair: Yves Deswarte

Purpose-based access control policies and conflicting analysis

(10:30-11:00)

Presenter: Hua Wang

Lili Sun, Vijay Varadharajan

Delegation in Predicate Encryption Supporting Disjunctive Queries

(11:00-11:30)

Presenter: Dongdong Sun

Colin Boyd, Juan Manuel Gonzalez Nieto

Tagging Disclosures of Personal Data to Third Parties to Preserve Privacy

(11:30-12:00)

Presenter: Sven Wohlgemuth

Isao Echizen, Noboru Sonehara, Günter Müller

k-Shares: A Privacy Preserving Reputation Protocol for Decentralized Environments

(12:00-12:30)

Presenter: Omar Hasan

Lionel Brunie, Elisa Bertino

 

Privacy
Session Chair: Jaap-Henk Hoepman

Towards Fair Indictment for Data Collection with Self-Enforcing Privacy

(13:30-14:00)

Presenter: Mark Stegelmann

How to enhance Privacy and Identity Management for Mobile Communities Approach and User driven Concepts of the PICOS Project

(14:00-14:30)

Presenter: Christian Kahl

Katja Böttcher, Markus Tschersich, Stephan Heim, Kai Rannenberg

Performance Analysis of Accumulator-based Revocation Mechanisms

(14:30-15:00)

Presenter: Jorn Lapon

Markulf Kohlweiss, Bart De Decker, Vincent Naessens

 

Closing
Session Chair: Rossouw von Solms, Collin Armstrong

Closing including Student Best Paper Award and Invitation to SEC 2011 in Lucerne, Switzerland

(15:00-15:30)