(20.09.2010 – 23.09.2010)
Please find the General SEC 2010 Page here
Kristian Beckman Award Awardee Keynote | |
The 5 Waves of Information Security – From Kristian Beckman to the Present (11:30-12:30) | |
Presenter: SH (Basie) von Solms |
Security Management | |
A Business Continuity Management Simulator (13:30-14:00) |
|
Presenter: Lam-for Kwok Dennis Longley, William J. Caelli | |
Mining Business-Relevant RBAC States Through Decomposition (14:00-14:30) | |
Presenter: Alessandro Colantonio Roberto Di Pietro, Alberto Ocello, Nino Vincenzo Verde | |
Group Dynamics in a Security Risk Management Context: A Teaching Case Study (14:30-15:00) |
|
Presenter: Stewart Kowalski Rostyslav Barabanov |
Security Management & Governance | |
Using Actor Network Theory to Understand Information Security Management (16:00-16:30) | |
Presenter: Karin Hedström Gurpreet Dhillon, Fredrik Karlsson | |
Information Security Governance: When Compliance Becomes more Important than Security (16:30-17:00) | |
Presenter: Atif Ahmad Terence Tan, Anthonie B. Ruighaver |
SEC 2010 (20.09.2010 – 23.09.2010)
Network Security & Authentication | |
Understanding Domain Registration Abuses (10:30-11:00) | |
Presenter: Scott E. Coull Andrew M. White, Ting-Fang Yen, Fabian Monrose, Michael K. Reiter | |
Who On Earth Is ”Mr. Cypher“: Automated Friend Injection Attacks on Social Networking Sites (11:00-11:30) | |
Presenter: Markus Huber Martin Mulazzani, Edgar Weippl | |
Authentic Refinement of Semantically Enhanced Policies in Pervasive Systems (11:30-12:00) | |
Presenter: Julian Schütte Nicolai Kuntze, Andreas Fuchs, Atta Badii | |
Mobile Qualified Server Signature (12:00-12:30) | |
Presenter: Clemens Orthacker Martin Centner, Christian Kittl |
Intrusion Detection, Trust Management and Models | |
Fraud Detection in ERP Systems using Scenario Matching (13:30-14:00) | |
Presenter: Malcom Corney Asadul Khandoker Islam, George Mohay, Andrew Clark, Shane Bracher, Tobias Raub, Ulrich Flegel | |
Use of IP Addresses for High Rate Flooding Attack Detection (14:00-14:30) | |
Presenter: Ejaz Ahmed George Mohay, Alan Tickle, Sajal Bhatia | |
Augmenting Reputation-based Trust Metrics with Rumor-like Dissemination of Reputation Information (14:30-15:00) | |
Presenter: Sascha Hauke Martin Pyka, Markus Borschbach, Dominik Heider | |
Ex-SDF: An Extended Service Dependency Framework For Intrusion Impact Assessment (15:00-15:30) | |
Presenter: Nizar Kheir Nora Cuppens-Boulahia, Frédéric Cuppens, Hervé Debar |
SEC 2010 (20.09.2010 – 23.09.2010)
Software Security and Assurance | |
A Dynamic and Ubiquitous Smart Card Security Assurance and Validation Mechanism (10:30-11:00) | |
Presenter: Raja Naeem Akram Konstantinos Markantonakis, Keith Mayes | |
On-the-fly Inlining of Dynamic Security Monitors (11:00-11:30) | |
Presenter: Alejandro Russo Jonas Magazinius, Andrei Sabelfeld | |
A Metric-Based Scheme for Evaluating Tamper Resistant Software Systems (11:30-12:00) | |
Presenter: Hongxia Jin Gideon Myles | |
Evaluation of the Offensive Approach in Information Security Education (12:00-12:30) | |
Presenter: Martin Mink Rainer Greifeneder |
Panel Panelist: | |
Research Methodologies in Information Security Research: The Road Ahead (13:30-15:30) | |
Presenter: Johan van Niekerk, Rossouw von Solms |
SEC 2010 (20.09.2010 – 23.09.2010)
Access Control & Privacy | |
Purpose-based access control policies and conflicting analysis (10:30-11:00) | |
Presenter: Hua Wang Lili Sun, Vijay Varadharajan | |
Delegation in Predicate Encryption Supporting Disjunctive Queries (11:00-11:30) | |
Presenter: Dongdong Sun Colin Boyd, Juan Manuel Gonzalez Nieto | |
Tagging Disclosures of Personal Data to Third Parties to Preserve Privacy (11:30-12:00) | |
Presenter: Sven Wohlgemuth Isao Echizen, Noboru Sonehara, Günter Müller | |
k-Shares: A Privacy Preserving Reputation Protocol for Decentralized Environments (12:00-12:30) | |
Presenter: Omar Hasan Lionel Brunie, Elisa Bertino |
Privacy | |
Towards Fair Indictment for Data Collection with Self-Enforcing Privacy (13:30-14:00) | |
Presenter: Mark Stegelmann | |
How to enhance Privacy and Identity Management for Mobile Communities Approach and User driven Concepts of the PICOS Project (14:00-14:30) | |
Presenter: Christian Kahl Katja Böttcher, Markus Tschersich, Stephan Heim, Kai Rannenberg | |
Performance Analysis of Accumulator-based Revocation Mechanisms (14:30-15:00) | |
Presenter: Jorn Lapon Markulf Kohlweiss, Bart De Decker, Vincent Naessens |
Closing | |
Closing including Student Best Paper Award and Invitation to SEC 2011 in Lucerne, Switzerland (15:00-15:30) |