Workshop program

September 12, 2013

08:00-09:00 Registration

09:00-09:30 General Welcome (Main Auditorium)

09:30-10:30 Invited Talk [Chair: Rafael Accorsi]

- Building trusted systems: lessons of the first generation of Trusted Computing research and practice
Claire Vishik, Intel Corporation, U.K.

10:30-11:00 Tea/Coffee Break

11:00-13:00 Session: Privacy & Business Process Security (I) [Chair: Markulf Kohlweiss]

- On Enhancement of "Share The Secret" Scheme for Location Privacy
Constantinos Delakouridis (Athens University of Economics and Business) and Christos Anagnostopoulos (Ionian University, Corfu, Greece).

- New Attacks against Transformation-Based Privacy-Preserving Linear Programming
Peeter Laud (Cybernetica AS, Estonia) and Alisa Pankova (University of Tartu, Estonia).

- Maintaing Database Anonymity in the Presence of Queries
Ryan Riley (Qatar University), Ahmet Erhan Nergiz (Purdue University), Chris Clifton (Purdue University) and Qutaibah Malluhi (Qatar University).

- Towards a Detective Approach to Business Process-centered Resilience
Thomas G. Koslowski (University of Freiburg) and Christian Zimmermann (University of Freiburg).

13:00-14:15 Lunch

14:15-15:45 Session: Business Process Security (II) & Security Protocols [Chair: Carmen Fernandez Gago]

- IF-Net: A Meta-model for Security-oriented Process Specification
Thomas Stocker (University of Freiburg, Germany) and Frank Böhr (University of Freiburg, Germany).

- Using Interpolation for the Verification of Security Protocols
Giacomo Dalle Vedove (University of Verona, Italy), Marco Rocchetto (University of Verona, Italy), Luca Viganò (University of Verona, Italy) and Marco Volpe (University of Verona, Italy).

- RDAS: A Symmetric Key Scheme for Authenticated Query Processing in Outsourced Databases
Lil Maria Rodriguez-Henriquez (CINVESTAV-IPN, Mexico) and Debrup Chakraborty (CINVESTAV-IPN, Mexico).

15:45-16:15 Tea/Coffee Break

16:15-17:45 Session: Network, Web, and Mobile Security [Chair: Luca Vigano`]

- A Probabilistic Framework for Distributed Localization of Attackers in MANETs
Alessandra De Benedictis (Department of Electrical Engineering and Information Technology - University of Naples Federico II - Naples, Italy), Behzad Koosha (Center for Secure Information Systems - George Mason University - Fairfax, VA, USA), Massimiliano Albanese (Center for Secure Information Systems - George Mason University - Fairfax, VA, USA) and Valentina Casola (Department of Electrical Engineering
and Information Technology - University of Naples Federico II - Naples, Italy).

- MITHYS: Mind The Hand You Shake - Protecting mobile devices from SSL usage vulnerabilities
Mauro Conti (University of Padua, Italy), Nicola Dragoni (Technical University of Denmark, Denmark) and Sebastiano Gottardo (University of Padua, Italy and Technical University of Denmark, Denmark).

- Evaluating the manageability of web browsers controls
Alexios Mylonas (Athens University of Economics and Business), Nikolaos Tsalis (Athens University of Economics and Business) and Dimitris Gritzalis (Athens University of Economics and Business).

17:45-18:45 STM-WG: Business Meeting

19:00-20:00 Pre-dinner Drinks

20:00-23:00 Workshop Dinner

September 13, 2013

09:00-09:30 Registration

09:30-10:30 Invited Talk [Chair: Silvio Ranise]

- Verifiable numerical aggregation of trust evidence for policy-based access control
Michael Huth, Imperial College, London, U.K.

10:30-11:00 Tea/Coffee Break

11:00-12:30 Session: Security Policies and Trust Management [Chair: Peeter Laud]

- Socio-technical Study on the Effect of Trust and Context when Choosing WiFi Names
Ana Ferreira (University of Luxembourg), Jean-Louis Huynen (University of Luxembourg), Vincent Koenig (University of Luxembourg), Gabriele Lenzini (University of Luxembourg) and Salvador Rivas (University of Luxembourg).

- Probabilistic Cost Enforcement of Security Policies
Yannis Mallios (Carnegie Mellon University), Lujo Bauer (Carnegie Mellon University), Dilsun Kaynar (Carnegie Mellon University), Fabio Martinelli (Istituto di Informatica e Telematica, National Research
Council) and Charles Morisset (Newcastle University).

- Selective Disclosure in Datalog-based Trust Management
Nik Sultana (Cambridge University), Moritz Becker (Microsoft Research Cambridge) and Markulf Kohlweiss (Microsoft Research Cambridge).

13:00-14:15 Lunch

14:15-15:15 Session: Watermarking for Security [Chair: Charles Morisset]

- Authenticity Control of Relational Databases by Means of Lossless Watermarking Based on Circular Histogram Modulation
Javier Franco-Contreras (Institut Mines-TELECOM/ TELECOM Bretagne), Gouenou Coatrieux (Institut Mines-TELECOM/ TELECOM Bretagne), Nora Cuppens-Boulahia (Institut Mines-TELECOM/ TELECOM Bretagne), Fréderic Cuppens (Institut Mines-TELECOM/ TELECOM Bretagne) and Christian Roux (Institut Mines-TELECOM/ TELECOM Bretagne).

- Weighted-Sum Fragile Watermarking in the Karhunen-Loève Domain
Marco Botta (Univ. di Torino), Davide Cavagnino (Univ. di Torino) and Victor Pomponiu (University of Pittsburgh).

15:15-15:30 Closing of the workshop

15:45-16:15 Tea/Coffee Break