ARES 2007, CISIS 2007 & WORKSHOPS PROGRAMME OUTLINEApril 10, 2007
| | Room A
| Room B
| Room C
| Room D | Room E | Room F | 08:00 - 09:00
| Registration | 09:00 - 09:15
| Welcome and pening Ceremony | 09:15 - 10:45
| ARES Session A1 | ARES Session B1 | FARES Session C1 | CISIS Session D1 | ECDS Workshop E1 | EBITS Workshop F1 | 10:45 - 11:15
| Coffee Break
| 11:15 - 12:15
| ARES Keynote 1 (at room A) | 12:15 - 13:30
| Lunch Break | 13:30 - 15:00
| ARES Session A2 | ARES Session B2
| FARES Session C2
| CISIS Session D2 | ECDS Workshop E2
| EBITS Workshop F2
| 15:00 - 15:30
| Coffee Break | 15:30 - 17:30
| ARES Session A3
| ARES Session B3
| FARES Session C3
| CISIS Session D3
| ECDS Workshop E3
| EBITS Workshop F3
| 18:00 - 22:00
| Bus trip to the Monastery, Klosterneuburg and Conference Dinner |
April 11, 2007
| | Room A | Room B
| Room C
| Room D
| Room E | Room F | 08:00 - 09:00 | Registration | 09:00 - 10:30 | ARES Session A4 | ARES Session B4 | FARES Session C4 | CISIS Session D4 | 3GPCS Workshop E4 | DeSeGov Workshop F4 | 10:30 - 11:00 | Coffee Break | 11:00 - 12:00
| ARES Keynote 2 (at room A) | 12:00 - 13:30
| Lunch Break | 13:30 - 15:00 | ARES Session A5 | ARES Session B5 | FARES Session C5 | CISIS Session D5 | 3GPCS Workshop E5 | DeSeGov Workshop F5 | 15:00 - 15:30
| Coffee Break | 15:30 - 17:30
| ARES Session A6 | ARES Session B6 | FARES Session C6 | CISIS Session D6 | 3GPCS Workshop E6 | DeSeGov Workshop F6 | 19:30 - 22:00 | Reception Dinner at the Vienna City Hall |
April 12, 2007 | | Room A
| Room B | Room C | Room D | Room E | Room F | 08:00 - 09:00 | Registration | 09:00 - 10:30 | ARES Session A7 | FARES Session B7 | WAIS Workshop C7 | DAWAM Workshop D7 | FOFDC Workshop E7 | SecSE Workshop F7 | 10:30 - 11:00
| Coffee Break
| 11:00 - 12:30 | ARES Session A8 | FARES Session B8 | WAIS Workshop C8 | DAWAM Workshop D8 | FOFDC Workshop E8 | SecSE Workshop F8 | 12:30 - 13:30
| Lunch Break
| 13:30 - 15:00 | ARES Session A9 | FARES Session B9 | WAIS Workshop C9 | DAWAM Workshop D9 | FOFDC Workshop E9 | SecSE Workshop F9
| 15:00 - 15:30 | Coffee Break
| 15:30 - 17:00 | ARES Session A10 | FARES Session B10 | WAIS Workshop C10 | | | |
April 13, 2007
| | Room A | Room B | Room C | 08:00 - 09:00 | Registration | 09:00 - 10:30 | ARES Session A11
| FARES Session B11
| SEL Workshop Session C11 | 10:30 - 11:00 | Coffee Break
| 11:00 - 12:30
| ARES Session A12
| FARES Session B12
| SEL Workshop Session C12 | End of Conference
|
ARES 2007, CISIS 2007 & WORKSHOPS DETAIL PROGRAMMEApril 10, 20078:00 - 9:00 Registration9:00 - 9:15 Welcome and Opening Ceremony A Min Tjoa, Vienna University of Technology, ARES PC Co-Chair
9:15 - 10:45 Parallel Sessions: Session A1: #Trust Model & Trust Management Chair: Gerald Quirchmayr 1. Formalising Dynamic Trust Negotiations in Decentralised Collaborative e-Health Systems Oluwafemi Ajayi, Richard Sinnott, Anthony Stell 2. Why Trust is not proportional to Risk Bjørnar Solhaug, Dag Elgesem, Ketil Stølen 3. From Trust to Dependability through Risk Analysis Yudistira Asnar, Paolo Giorgini, Fabio Massacci, Nicola Zannone Session B1: #Availability, Fault-Tolarant & Recovery Chair: Ric Holt 1. Availability and Performance of the Adaptive Voting Replication Protocol Johannes Osrael, Lorenz Froihofer, Karl M. Goeschka 2. Distributed Stream Processing Analysis in High Availability Context Marcin Gorawski, Pawel Marks 3. Implementing Network Partition-Aware Fault-Tolerant CORBA Systems Stefan Beyer, Francesc D. Muñoz-Escoí, Pablo Galdámez Session C1: (FARES) #RFID Techniques & Applications Chair: Shamik Sural 1. RFID Security Issues in Military Supply Chains Qinghan Xiao, Cam Boulet, Thomas Gibbons 2. The Cost of Preserving Privacy: Performance Measurements of RFID Pseudonym Protocols Jens Mache, Chris Allick
Session D1: (CISIS) # Wireless Networks Chair: Leonard Barolli 1. A Real-Time Component-Oriented Middleware for Wireless Sensor and Actor Networks J. Barbaran, M. Diaz, I. Esteve, D. Garrido, L. Llopis, B. Rubio 2. An Efficient Data Transmission Protocol in a Wireless Sensor-Actuator Network Kiyohiro Morita, Kenichi Watanabe, Naohiro Hayashibara, and Makoto Takizawa 3. MPLS Traffic Engineering in Satellite Networks A. Durresi, M. Durresi, F. Xhafa and L. Barolli Session E1: (ECDS) #Middleware Systems Chair: Markus Aleksy 1. Functional Classes Guide Use of Design Patterns in Implementing Mediators Mikko Kontio, Hannu Mayra, Mauno Ronkko 2. Applying MDE Methodologies to Design Communication Protocols for Distributed Systems Jesus Martinez, Pedro Merino, Alberto Salmeron 3. Implementation and Performance of a New Teleconference System by High Definition Omni-directional Video Transmission over IP Network Yosuke Sato, Yuya Maita, Koji Hashimoto and Yoshitaka Shibata 4. Generating Families of Business Components from Metamodel Hierarchies Michael Schwind, Markus Aleksy Session F1: (EBITS) Paper Session Chair: Stefan Biffl
1. Using space-based computing for more efficient group coordination and monitoring in an event-based work management systemMarcus Mor, Richard Mordinyi, Johannes Riemer 2. Exception Handling in an Event-Driven SystemJan Ploski, Wilhelm Hasselbring 3. Indexing and Search of Correlated Business Events Roland Vecera, Szabolcs Rozsnyai, Heinz Roth
10:45 - 11:15 Coffee Break11:15 - 12:15 Keynote 1"Security principles for the Austrian eGovernment"Prof. Dr. Reinhard Posch, “Chief Information Officer” for the Federal Republic of Austria, heading the platform “Digital Austria”.12:15-13:30 Lunch13:30-15:00 Parallel Sessions Session A2: #Trust Management Chair: Bhavani Thuraisingham 1. Dynamic trust domains for secure, private, technology-assisted living Jatinder Singh, Jean Bacon, Ken Moody 2. A Hybrid Trust Model for Enhancing Security in Distributed Systems Ching Lin, Vijay Varadharajan (Ching Lin is sponsored and supported by Auckland University of Technology, New Zealand, and Macquarie University, Australia) 3. A Reliable Component-Based Architecture for E-Mail Filtering Wilfried Gansterer, Andreas Janecek, Peter Lechner Session B2: #Availability, Fault-Tolarant & Recovery Chair: Stefan Beyer 1. Failure Recovery in Cooperative Data Stream Analysis Bin Rong, Fred Douglis, Zhen Liu, Cathy Xia 2. A Recovery Protocol for Middleware Replicated Databases Providing GSI José Enrique Armendáriz-Iñigo, Francesc Daniel Muñoz-Escoí, José Ramón Juárez-Rodríguez, José Ramón González de Mendívil-Moreno , Bettina Kemme 3. Applying a Tradeoff Model (TOM) to TACT Raihan Al-EKram, Ric Holt, Chris Hobbs Session C2: (FARES) #Access Control Chair:Oliver Jorns 1. Realizing fine-granular Read and Write Rights on Tree Structured Documents Franz Kollmann 2. Access Control Model for Web Services with Attribute Disclosure Restriction Vipin Singh Mewar, Subhendu Aich, Shamik Sural 3. Aggregating and Deploying Network Access Control Policies Joaquin Garcia-Alfaro, Frederic Cuppens, Nora Cuppens-Boulahia Session D2: (CISIS) #Grid Computing Chair:Fatos Xhafa 1. A Monitoring Service for Relational Databases to Support Advanced Data Integration on the Grid Alexander Woehrer and Peter Brezany 2. Using a Grid Platform for Enabling Real Time User Modeling in On-line Campus Santi Caballe, Fatos Xhafa, Thanasis Daradoumis, Joan Esteve, Leonard Barolli, Arjan Durresi 3. A Job Schedule Model Based on Grid Environment Homer Wu, Chong-Yen Lee, Wuu-Yee Chen, Tsang-Yean Lee Session E2: (ECDS) #Network Protocols and Algorithms Chair:Markus Aleksy 1. Path Shortening Schema for Minimum Delay Spanning Tree on Overlay Multicast Hiroki Saito, Yoichi Nakamura 2. Task Decomposition and Delegation Algorithms for Coordinating Unstructured Multi Agent Systems Antonio Luis Lopes, Luis Miguel Botelho 3. Ontology-based Context Management Agent for Vertical Handoff Using Fuzzy Logic Decision in Heterogeneous Network Nguyen Thi Thanh Huong, Matsumoto Mitsuji 4. In-Network Storage Model for Data Persistence under Congestion in Wireless Sensor Networks Majid I Khan, Wilfried N Gansterer, Günter Haring Session F2: (EBITS) Keynote and Panel Session Chair: Eva Kühn Key note: Scalable Space-Based Computing Architectures as Enabler for Event-Driven Systems in Open EnvironmentsSpeaker: Geri Joskowicz Industry panel: Information Sharing in Mission-Critical EnvironmentsFrequentis: Christoph Rihacek, Alexander Mikula
15:00 - 15:30 Coffee Break15:30 - 17:30 Parallel SessionsSession A3: #Reputation Management & Trust Chair: Yannis Stamatiou 1. Reputation Management Survey Sini Ruohomaa, Lea Kutvonen, Eleni Koutrouli 2. Dirichlet Reputation Systems Audun Josang, Jochen Haller 3. Compartmented Security for Browsers---Or How to Thwart a Phisher with Trusted Computing Sebastian Gajek, Ahmad-Reza Sadeghi, Christian Stueble, Marcel Winandy 4. Secure Anonymous Union Computation Among Malicious Partners Sebastian Obermeier, Stefan Böttcher Session B3: #Privacy & Access Control Chair: Christian Schläger 1. A Privacy Enhancing Service Architecture for Ticket-based Mobile Applications Oliver Jorns, Gerald Quirchmayr, Oliver Jung 2. Privacy in Pervasive Computing and Open Issues Pankaj Bhaskar , Sheikh I Ahamed 3. Context-Dependent Access Control for Contextual Information Christin Groba, Stephan Groß, Thomas Springer 4. Bytecode Verification for Enhanced JVM Access Control Dongxi Liu Session C3: (FARES) #Authentication Chair: Leila Ismail 1. Secure Spatial Authentication using Cell Phones Arjan Durresi, Vamsi Paruchuri, Mimoza Durresi, Leonard Barolli 2. Broadcast Authentication Protocol with Time Synchronization and Quadratic Residues Chain Bogdan Groza 3. A Secure Key Exchange and Mutual Authentication Protocol for Wireless Mobile Communications HE Yijun, XU Nan, LI Jie 4. Improved Client-to-Client Password-Authenticated Key Exchange Protocol Yao Gang, Feng Dengguo, Han Xiaoxi
Session D3: (CISIS) #Distributed Systems and Applications Chair:Fumiaki Sato 1. E-Service Emergence: A Bio-Inspired Method of Composition Hongbin Sun, Yongsheng Ding 2. A Distributed QoS Routing and CAC Framework: Performance Evaluation of Its SSRA and InterD Agents Leonard Barolli, Makoto Ikeda, Arian Durresi, Fatos Xhafa, Akio Koyama 3. Leasing Variants in Distributed Systems Michael Schneider, Markus Aleksy, Martin Schader, Makoto Takizawa 4. Cell-locomotin-based Agent Migration over Distributed Systems Ichiro Satoh 5. Estimation of Trustworthiness for P2P System in Collusive Attack Fumiaki Sato
Session F3: (EBITS) Paper Session (cont) Chair: Alexander Schatten 1. "Optimizing Events Traffic in Event-based Systems by means of Evolutionary Algorithms"; Jiri Kubalik, Richard Mordinyi 2."Event-Based Open Source Software Project Monitoring"; Dindin Wahyudin, A Min Tjoa 3. "Issues in Testing Dependable Event-Based Systems at a Systems Integration Company"; Armin Beer, Matthias Heindl 18:00 Bus trip to the Monastery, Klosterneuburg and Conference Dinner
April 11, 20078:00 - 9:00 Registration 9:00 - 10:30 Parallel Sessions: Session A4: #Failure Detection & Attack Prevention Chair:Dil Hussain 1. Automatic Failure Detection with Separation of Concerns Peter Hazy, Rudolph Seviora 2. A Failure Detection Service for Large-Scale Dependable Wireless Ad-Hoc and Sensor Networks Mourad ELHADEF, Azzedine BOUKERCHE 3. Intrusion detection system for signal based SIP attacks through timed HCPN Yanlan Ding, Guiping Su
Session B4:#Authentication & Authorisation Chair:Yuri Demchenko 1. Errors in Attacks on Authentication Protocols Anders Moen Hagalisletto 2. Effects of Architectural Decisions in Authentication and Authorisation Infrastructures Christian Schläger, Monika Ganslmayer 3. Vulnerability Analysis of EMAP-An Efficient RFID Mutual Authentication Protocol Tieyan Li, Robert Deng Session C4: (FARES) #Real-time System & Sensor Network Chair: Makoto Takizawa 1. Adaptation Mechanisms for Survivable Sensor Networks against Denial of Service Attack Dong Seong Kim, Chung Su Yang, Jong Sou Park 2. Models for automatic generation of safety-critical real-time systems Christian Buckl, Matthias Regensburger, Alois Knoll, Gerhard Schrott 3. A user behaviour control framework Bastian Preindl, Alexander Schatten Session D4: (CISIS) #Network Performance Chair: Takuo Nakashima 1. The Effect of Bursty Lengths on DQDB Networks R. N. Chiou and J. K. Guo 2. Performance Estimation of TCP under SYN Flood Attacks Takuo Nakashima 3. New-emerging Service-support Model for Converged Multi-Service Network and its Practical Validation Natalia Kryvinska, Peter Zinterhof, Do van Thanh Session E4: (3PGIC) # Internet Computing Chair: Yoshitaka Shibata 1. Decentralized Service Deployment for Collaborative Environments Daniel Lazaro Iglesias, Joan Manuel Marques i Puig, Josep Jorba Esteve 2. Scalable Collaborative Virtual Environment Considering User’s Interests Based on P2P Overlay Network Yushi Nakai, Yoshitaka Shibata 3. Design and Implementation of a Remote Medical-care Supporting System Akio Koyama, Junpei Arai, Satoshi Sasaki, Leonard Barolli Session F4: (DeSeGov) # eVoting & eElection Chair: A Min Tjoa 1. Requirements and Evaluation Procedures for eVoting Melanie Volkamer, Margaret McGaley 2. Towards Secure E-Elections in Turkey: Requirements and Principles Orhan Cetinkaya, Deniz Cetinkaya 3. On Coercion-Resistant Electronic Elections with Linear Work Stefan Weber, Roberto Araujo, Johannes Buchmann
10:30 - 11:00 Coffee Break11:00 - 12:00 Keynote 2: "Data Mining, Security and Privacy: Developments and Directions"Prof. Bhavani Thuraisingham, Director of Cyber Security Research Center, University of Texas at Dallas (UTD)12:00 - 13:30 Lunch13:30 - 15:00 Parallel SessionsSession A5: #Failure Detection & Attack Prevention Chair: Rudolph Seviora 1. 3G-WLAN Convergenge: Vulnerability, Attacks Possibilities and Security Model Muhammad Sher, Thomas Magedanz 2. Specification and Detection of TCP/IP Based Attacks Using the ADM-Logic Meriam Ben Ghorbel, Mehdi Talbi, Mohamed Mejri 3. Near Optimal Protection Strategies Against Targeted Attacks on the Core Node of a Network Frank Yeong-Sung Lin, Po-Hao Tsang, Yi-Luen Lin
Session B5: #Authentication & Authorisation Chair: Gunter Pernul 1. Authentication Mechanisms for Mobile Agents Leila Ismail 2. Using SAML and XACML for Complex Authorisation Scenarios in Dynamic Resource Provisioning Yuri Demchenko, Leon Gommans, Cees de Laat 3. Implicit Authorization for Accessing Location Data in a Social Context Georg Treu, Florian Fuchs, Christiane Dargatz Session C5: (FARES) #Fault-Tolarent & Availabilty Chair: José Enrique Armendáriz-Iñigo 1. High Availability for Network Management Applications Prabhu S, Venkat S 2. RWAR: A Resilient Window-consistent Asynchronous Replication Protocol Yanlong Wang, Zhanhuai Li, Wei Lin 3. Fault-Tolerant Semi-Passive Coordination Protocol for a Multi-Actuator/Multi-Sensor (MAMS) Model Keiji Ozaki, Naohiro Hayashibara, Tomoya Enokido, Makoto Takizawa Session D5: (CISIS) #P2P Systems and MANET Chair: Makoto Takizawa 1. A Superpeer-based Two-layer P2P Overlay Network with the CBF Strategy Kenichi Watanabe, Naohiro Hayashibara, and Makoto Takizawa 2. Peer-to-Peer Based Mobile Video On-Demand with Layered Video Distribution Katsuhiko Sato, Michiaki Katsumoto, Tetsuya Miki 3. Large Scale Distributed Disaster Information System based on MANET and Overlay Network Yoshitaka Shibata, Hiroaki Yuze, Tsuyoshi Hoshikawa, Kazuo Takahata, Nobuhiro Sawano 4. P Systems and Finite Automata Xian Xu, China Session E5: (3PCIC) #Grid Computing Chair: Fatos Xhafa 1. Selecting Grid-agent-team to Execute User-job—initial Solution Mateusz Dominiak, Maria Ganzha, Marcin Paprzycki 2. Gridifying IBM's Generic Log Adapter to Speed-up the Processing of Log Data Claudi Paniagua, Fatos Xhafa, Thanasis Daradoumis 3. On the Advantages of Using Web & Grid Services for the Development of Collaborative Learning Management Systems Santi Caballe Session F5: (DeSeGov) # eVoting & eElection Chair: A Min Tjoa 1. A SECURITY MODEL AND ARCHITECTURE FOR MULTICHANNEL E-GOVERNMENT SYSTEMS Mariagrazia Fugini 2. eTVRA, a threat, vulnerability and risk assessment method and tool for eEurope Judith E. Y. Rossebø, Scott Cadzow, Paul Sijben 3. Framework for Information Sharing Across Multiple Government Agencies under Dynamic Access Policies Kailash Bhoopalam, Kurt Maly, Ravi Mukkamala, Mohammad Zubair
15:00 - 15:30 Coffee Break15:30 - 17:30 Parallel SessionsSession A6: #Security Algorithm & Framework Chair: Marcin Gorawski 1. Fingerprint Matching Algorithm Based on Tree Comparison Using Ratios of Relational Distances Abinandhan Chandrasekaran, Bhavani Thuraisingham 2. Reconfigurable Implementation of the New Secure Hash Algorithm Zeghid medien, Bouallegue Belgacem, Baganne Adel, Machhout Mohsen, Tourki Rached 3. Applications for Provably Secure Intent Protection with Bounded Input-Size Programs Jeffrey Todd McDonald, Alec Yasinsac 4. A Framework for the Development of Secure Data Warehouses based on MDA and QVT Emilio Soler, Juan Trujillo, Eduardo Fernández-Medina, Mario Piattini
Session B6: #Software Security Chair: Martin Jaatun 1. Design of a Process for Software Security David Byers, Nahid Shahmehri 2. STEF: A Secure Ticket-Based En-route Filtering Scheme for Wireless Sensor Networks Christoph Krauß, Markus Schneider, Kpatcha Bayarou, Claudia Eckert 3. A secure architecture for the pseudonymization of medical data Bernhard Riedl, Thomas Neubauer, Gernot Goluch, Oswald Boehm, Gert Reinauer, Alexander Krumboeck 4. Collection of quantitative data on security incidents Thomas Nowey, Hannes Federrath Session C6: (FARES) # Trust Management & Trust Model Chair: Jochen Haller 1. Trust in global computing systems as a limit property emerging from short range random interactions Vasiliki Liagkou, Effie Makri, Paul Spirakis, Yannis Stamatiou 2. A Trust Overlay Architecture and Protocol for Enhanced Protection against Spam Jimmy McGibney, Dmitri Botvich 3. HICI: AN APPROACH FOR IDENTIFYING TRUST ELEMENTS Simon Samwel Msanjila, Hamideh Afsarmanesh 4. A Semantic and Time Related Recommendation-Feedback Trust Model ZhangLin, XuFeng, WangYuan, LvJian Session D6: (CISIS) # Data Structure and Mathematical Modeling Chair: Andrei Doncescu 1. Compact Hilbert Indices for Multi-Dimensional Data Chris H. Hamilton, Andrew Rau-Chaplin 2. Data Structure Estimation for RDF Oriented Repository Building Martin Rimnac, Czech Republic 3. Fault Detection Using Differential Flatness in Flight Guidance Systems Wen Chi Lu, Rabbah Fellouah, Nan Zhang, Felix Mora-Camino, Andrei Doncescu 4. An Inter-peer Trustworthiness Based on Access Control in Peer-to-Peer Overlay Networks Yoshio Nakajima, Kenichi Watanabe, Valbona Barolli, Naohiro Hayashibara, Tomoya Enokido and Makoto Takizawa Session E6: (3PGIC) #Parallel and P2P Systems Chair: Fatos Xhafa 1. Parallel Branch and Bound on Peer to Peer Systems E-G. Talbi, A. Bendjoudi, N. Melab 2. Performance Modeling and Prediction of Parallel and Distributed Computing Systems: A Survey of the State of the Art Sabri Pllana, Ivona Brandic and Siegfried Benkner 3. Obtaining Performance Measures through Microbenchmarking in a Peer-to-Peer Overlay Computer Paolo Bertasi, Mauro Bianco, Andrea Pietracaprina, and Geppino Pucci 4. A Distributed Coordination Algorithm for a Heterogeneous Group of Peers Ailixier Aikebaier, Naohiro Hayashibara, Tomoya Enokido, and Makoto Takizawa Session F6: (DeSeGov) # eGovernment Management Chair: A Min Tjoa 1. Secure Distributed Dossier Management in the Legal Domain Martijn Warnier, Frances Brazier, Martin Apistola, Anja Oskamp 2. Building a Dependable Messaging Infrastructure for Electronic Government Elsa Estevez, Tomasz Janowski
19:30 Reception dinner (Vienna City Hall)
April 12, 2007 8:00 - 9:00 Registration 9:00 - 10:30 Parallel Sessions:Session A7: #Security Models Chair: Thomas Nowey 1. Security vulnerabilities in DNS and DNSSEC Suranjith Ariyapperuma, Chris J. Mitchell 2. Secure, Resilient Computing Clusters: Self-Cleansing Intrusion Tolerance with Hardware Enforced Security (SCIT/HES) David Arsenault, Arun Sood, Yih Huang 3. Revisiting Hot Passive Replication Rubén de Juan-Marín , Hendrik Decker, Francesc D. Muñoz-Escoí Session B7: (FARES) #Security issue in Business Management Chair:Mariagrazia Fugini 1. Agent Alliances: A Means for Practical Threshold Signature Regine Endsuleit, Christoph Amma 2. Protecting Online Transactions with Unique Embedded Key Generators Martin Boesgaard, Erik Zenner 3. A research agenda for Autonomous Business Process Management Thomas Neubauer, Gernot Goluch, Bernhard Riedl Session C7: (WAIS) #Intrusion prevention and Authentication Chair: Leonard Barolli 1. An Approach for Adaptive Intrusion Prevention Based on The Danger Theory Alexander Krizhanovsky, Alexander Marasanov 2. A Human-Verifiable Authentication Protocol Using Visible Laser Light Rene Mayrhofer and Martyn Welch 3. Insider-secure Hybrid Signcryption Scheme Without Random Oracles Chik How Tan Session D7: (DAWAM) #Secure Data Warehouse Chair: Tho Manh Nguyen 1. Extended RBAC –Based Design and Implemebtation for a Secure Data Warehouse Bhavani Thuraisingham, Srinivasan Iyer 2. Application of QVT for the Development of Secure Data Warehouses: A case Study Emilio Soler, Juan Trujillo, Eduardo Fernández-Medina, Mario Piattini 3. Protecting Private Information by Data Separation in Distributed Spatial Data Warehouse Marcin Gorawski, Jakub Bularz Session E7: (FOFDC) # Opening, Invited Talk, and First Paper Presentation Chair: Christian Storm, Timo Warns 1. Opening 2. Invited Talk by Andre Schiper 3. A universal construction for concurrent objects Rachid Guerraoui, Michel Raynal Session F7: (SecSE) # Security & Privacy Issues Chair: Martin Jaatun 1. Using Privacy Process Patterns for Incorporating Privacy Requirements into the System Design Process Christos Kalloniatis, Evangelia Kavakli, Stefanos Gritzalis 2. How can the developer benefit from security modeling? Shanai Ardi, David Byers, Per Håkon Meland, Inger Anne Tøndel, Nahid Shahmehri 3. AProSec: an Aspect for Programming Secure Web Applications Laurence Duchien, Roberto Gomez, Gabriel Hermosillo, Lionel Seinturier 10:30 - 11:00 Coffee Break11:00 - 12:30 Parallel Sessions Session A8: #Security Models Chair: Vidar Seeberg 1. A Pattern System for Security Requirements Engineering Denis Hatebur, Maritta Heisel, Holger Schmidt 2. Security Requirements for a Semantic Service-oriented Architecture Stefan Dürbeck, Rolf Schillinger, Jan Kolter 3. Supporting Compliant and Secure User Handling - A Structured Approach for In-House Identity Management Ludwig Fuchs, Günther Pernul Session B8: (FARES) #Web, XML, Content Management Chair: Amin Andjomshoaa 1. Web Application Development and Global Regulation William Bradley Glisson, L. Milton Glisson, Ray Welland 2. Query Assurance Verification for Dynamic Outsourced XML Databases Viet Hung Nguyen, Tran Khanh Dang, Nguyen Thanh Son, Josef Küng 3. A Reflection-Based Framework for Content Validation Lars-Helge Netland, Yngve Espelid, Khalid Azim Mughal Session C8: (WAIS 2007) #Monitoring & Security Analysis Chair: Hiroaki Kikuchi 1. ZeroBio – Evaluation and Development of Asymmetric Fingerprint Authentication System Using Oblivious Neural Network Evaluation Protocol Kei Nagai, Hiroaki Kikuchi, Wakaha Ogata, Masakatsu Nishigaki 2. A Policy Language for the Extended Reference Monitor in Trusted Operating Systems Hyung Chan Kim, R.S. Ramakrishna, Wook Shin, Koiuchi Sakurai 3. Analysis on Bleichenbacher’s Forgery Attack Tetsuya Izu, Takeshi Shimoyama, Masahiko Takenaka Session D8: (DAWAM) # Intrusion Detection Chair: Tho Manh Nguyen 1. Applying a Flexible Mining Architecture to Intrusion Detection Marcello Castellano, Angela Aprile, Giuliano Bellone de Grecis, Flaviano Fiorino 2. An Application of Learning Problem in Anomaly-based Intrusion Detection Systems Veselina Jecheva, Evgeniya Nikolova 3. Detecting Critical Regions in Covert Networks: A Case Study of 9/11 Terrorists Network Nasrullah Memon, Kim C. Kristoffersen, David L. Hicks, Henrik Legind Larsen Session E8: (FOFDC) # Paper Presentation Chair: Christian Storm, Timo Warns 1. FCPre - Extending the Arora-Kulkarni Method of Automatic Addition of Fault-Tolerance Bastian Braun 2. On the implementation of the Omega failure detector in the crash-recovery failure model Cristian Martín, Mikel Larrea, Ernesto Jiménez 3. A Fault Identification Protocol for Emergency/Rescue MANETs and Wireless Mesh Networks: Proof and Complexity Analysis Mourad Elhadef, Azzedine Boukerche Session F8: (SecSE) # Security & Threat Management Chair: Martin Jaatun 1. Empirical and statistical analysis of techniques for threat management based on risk analysis Koen Buyens, Bart De Win, Wouter Joosen 2. Secure Software Development through Coding Conventions and Frameworks Takao Okubo, Hidehiko Tanaka 3. Pastures: Towards Usable Security Policy Engineering Sergey Bratus, Doug McIlroy, Alex Ferguson, Sean Smith 12:30 - 13:30 Lunch13:30 - 15:00 Parallel SessionsSession A9: #eAuction & eVoting Protocol Chair: Martijn Warnier 1. A Practical Verifiable e-Voting Protocol for Large Scale Elections over a Network Orhan Cetinkaya, Ali Doganaksoy 2. An Efficient eAuction Protocol Brian Curtis, Josef Pieprzyk, Jan Seruga 3. Enhancing the Security of Local Danger Warnings in VANETs - A Simulative Analysis of Voting Schemes Benedikt Ostermaier, Florian Dötzer, Markus Strassberger Session B9: (FARES) #Security Policies & Techniques Chair: Nahid Shahmehri 1. Web Engineering Security: Essential Elements William Bradley Glisson, Ray Welland 2. Designing a Security Policy According to BS 7799 Using the OCTAVE Methodology Paulina Januszkiewicz, Marek Pyka 3. CSP-Based Firewall Rule Set Diagnosis using Security Policies S. Pozo, R. Ceballos, R. M. Gasca 4. CASSIS - Computer-based Academy for Security and Safety in Information Systems Gernot Goluch, Andreas Ekelhart, Stefan Fenz, Stefan Jakoubi, Bernhard Riedl, Simon Tjoa Session C9: (WAIS 2007) #Security Protocols Chair: Hiroaki Kikuchi 1. A Proposal of the Method for Reducing the Revocation Delay in the Attribute Authentication Yoshio Kakizaki, Hidekazu Tsuji 2. Efficient Multiparty Computation for Comparator Networks Koji Chida, Hiroaki Kikuchi, Gembu Morohashi, Keiichi Hirota 3. A Security Framework for RFID Multi-domain System Dong S. Kim, Jong S. Park 4. Pseudo-Voter Identity (PVID) Scheme for e-Voting Protocols Orhan Çetinkaya and Ali Do?anaksoy Session D9:(DAWAM) # Heterogeneous Applications Chair: Tho Manh Nguyen 1. Access Control and Integration of Health Care Systems: An Experience Report and Future Challenges Lillian Røstad, Inger Anne Tøndel, Per Håkon Meland, Øystein Nytrø 2. A Collaborative Inter Data Grids Model with Hybrid Namespace Dalia El-Mansy, Ahmed Sameh 3. Reliability Markov Chains for Security Data Transmitter Analysis Calin Ciufudean, Bianca Satco, Constantin Filote Session E9: (FOFDC) # Paper Presentation & Discussion Chair: Christian Storm, Timo Warns 1. Self-Stabilization as a Foundation for Autonomic Computing Olga Brukman, Shlomi Dolev, Yinnon Haviv, Reuven Yagel 2. On Programming Models for Service-Level High Availability Christian Engelmann, Stephen L. Scott, Chokchai (Box) Leangsuksun, Xubin (Ben) He 3. Discussion & End of Workshop Session F9: (SecSE) # Secure Applications Chair: Martin Jaatun 1. Security Objectives within a Security Testing Case Study Kaarina Karppinen, Reijo Savola, Mikko Rapeli, Esa Tikkala 2. CppTest: A Prototype Tool for Testing C/C++ Programs Chengying Mao, Yansheng Lu 3. A Novel Approach to Building Secure Systems Dragan Vidakovic, Dejan Simic Workshop Close: Martin Jaatun
15:00 - 15:30 Coffee Break15:30 - 17:30 Parallel SessionsSession A10: #Miscelaneous Security Techniques Chair: Jordi Forné 1. A New Classification Scheme for Anonymization of Real Data Used in IDS Benchmarking Vidar Evenrud Seeberg, Slobodan Petrovic 2. Static evaluation of certificate policies for GRID PKIs interoperability Valentina Casola, Jesus Luna, Oscar Manso, Manel Medina, Massimiliano Rak, Nicola Mazzocca 3. Towards an Ontology-based Risk Assessment in Collaborative Environment using the SemanticLIFE Mansoor Ahmed, Amin Anjomshoaa, Tho Manh Nguyen, A Min Tjoa 4. Comparing classifier combining techniques for mobile-masquerader detection Oleksiy Mazhelis, Seppo Puuronen
Session B10: (FARES) #Secure Solution & Applications Chair: Ching Lin 1. A Modular Architecture for Secure and Reliable Distributed Communication Chamikara Madhusanka Jayalath, Ruchith Udayanga Fernando 2. Security Oriented e-Infrastructures Supporting Neurological Research and Clinical Trials Anthony Stell, Richard Sinnott, Oluwafemi Ajayi, Jipu Jiang 3. Securing Medical Sensor Environments: The CodeBlue Framework Case Georgios Kambourakis, Eleni Klaoudatou, Stefanos Gritzalis 4. A set of QVT relations to transform PIM to PSM in the Design of Secure Data Warehouses Emilio Soler, Juan Trujillo, Eduardo Fernández-Medina, Mario Piattini Session C10: (WAIS 2007) #Security Protocols (cont.) Chair: Leonard Barolli 1. Attacks are Protocols Too Anders Moen Hagalisletto 2. Evaluation Function for Synthesizing Security Protocols by means of Genetic Algorithms Luis Zarza, Josep Pegueroles, Miguel Soriano 3. On the use of one-way chain based authentication protocols in secure control systems Bogdan Groza, Toma Leonida Dragomir 4. Bypassing Data Execution Prevention on Microsoft Windows XP SP2 Nenad Stojanovski, Marjan Gushev, Danilo Gligoroski, Svein J. Knapskog
April 13, 2007 8:00 - 9:00 Registration 9:00 - 10:30 Parallel Sessions:Session A11: #Dependability in Distributed & Ubiquitous Computing Chair: Markus Aleksy 1. Decoupling Constraint Validation from Business Activities to Improve Dependability in Distributed Object Systems Lorenz Froihofer, Johannes Osrael, Karl M. Goeschka 2. Dependability Aspects of Ubiquitous Computing Lu Yan, Kaisa Sere 3. Concurrency Control using Subject- and Purpose-Oriented (SPO) View Tomoya Enokido, Makoto Takizawa Session B11: (FARES) #Miscelaneous Applications Chair: Leonard Barolli 1. AsmLSec: An Extension of Abstract State Machine Language for Attack Scenario Specification Mohammad Raihan, Mohammad Zulkernine 2. Error Modeling in RF-based Location Detection (EMLD) for Pervasive Computing Environments Niraj Swami, Sheikh I Ahamed 3. A performance model to Cooperative Itinerant Agents (CIA): a security scheme to IDS Rafael Páez, Cristina Satizábal, Jordi Forné Session C11: (SEL) # Trends in E-Learning Applications Chair: Edgar Weippl 1. e-learning 2.0 = e-learning 1.0 + Web 2.0? Martin Ebner 2. Blended Learning Technology in Information Security Management Courses Gerald Quirchmayr 3. Defining a Trusted Service-Oriented Environment Emmanuel Adigun, Jan Eloff
10:30 - 11:00 Coffee Break11:00 - 12:30 Parallel Sessions Session A12: #Anomaly & Intrusion Detection Chair: Marek Pyka 1. Universally Composable Three-party Key Distribution TingMao Chang, YueFei Zhu, Jin Zhou, YaJuan Zhang 2. Terrorist Networks Analysis through Argument Driven Hypotheses Model Dil Muhammad Akbar Hussain Session B12: (FARES) #Miscelaneous Applications Chair: Lu Yan 1. On the Assessment of the Interaction Quality of Users with Cerebral Palsy Cesar Mauri-Loba, Toni Granollers, Agusti Solanas 2. Research and Design of Mobile Impeachment System with Semi-cryptonym Chaobo Yang, Ming Qi 3. Efficient Malicious Agreementin a Virtual Subnet Network Shu-Ching Wang, Shyi-Ching Liang, Kuo-Qin Yan, Guang-Yan Zheng Session C12: (SEL) # Survey & Talks Chair: Edgar Weippl 1. Designing a Cryptographic Scheme for e-Surveys in Higher-education Institutions Alan Ward, Jordi Castellà-Roca, Aleix Dorca-Josa 2. „T-Security Handbook for SMEs” Talk by Bernhard Strilka 3. „Overview of Certified Pen Testing Specialist CPTS” Talk by Benjamin Böck
|