[Apologies if you receive multiple copies of this message] CALL FOR PARTICIPATION
---------------------------------------------------------------------- 5th International Workshop on Security and Trust Management (STM 2009) Saint Malo, France -- September 24-25, 2009 http://stm09.dti.unimi.it ---------------------------------------------------------------------- ABOUT THE CONFERENCE STM (Security and Trust Management) is a established working group of ERCIM (European Research Consortium in Informatics and Mathematics). STM 2009 is the fifth workshop in this series and will be held in Saint Malo, France, in conjunction with ESORICS 2009 (14th European Symposium on Research in Computer Security). STM has the following aims: - to investigate the foundations and applications of security and trust in ICT; - to study the deep interplay between trust management and common security issues such as confidentiality, integrity, and availability; - to identify and promote new areas of research connected with security management (e.g. dynamic and mobile coalition management, P2P, MANETs, Web/GRID services); - to identify and promote new areas of research connected with trust management (e.g., reputation, recommendation, and collaboration); - to provide a platform for presenting and discussing emerging ideas and trends. The 5th Security and Trust Management Workshop (STM 2009) will be held in Saint Malo, France. REGISTRATION Registration information is available at http://stm09.dti.unimi.it/registration.php PROGRAM September 24, 2009 ------------------ 9:00 - 10:30 Business meeting 10:30 - 11:00 Coffee break 11:00 - 12:00 Invited talk - TBA 12:00 - 12:30 INFORMATION SECURITY MANAGEMENT - Information Security Management: A Collaborative Approach Frank Innerhofer-Oberperfler, Daniel Bachlechner, Ronald Maier, Verena Hahn, Manuela Weitlaner, and Ruth Breu 12:30 - 14:00 Lunch 14:00 - 15:30 SOCIAL NETWORKS AND TRUST - A Measurement of Mixing Time in Social Networks Matteo Dell'Amico and Yves Roudier - Resource access in Multi-Provider Networks using Role Based Trust Management Paolo Mori, Maurizio Colombo, Fabio Martinelli, Barbara Martini, Fabio Baroncelli, and Piero Castoldi - Distinguishing Fact and Fiction: Data Mining Online Identities Roya Feizy, Ian Wakeman, and Dan Chalmers 15:30 - 16:00 Coffee break 16:00 - 17:30 CRYPTOGRAPHY, PRIVACY AND LANGUAGE-BASED SECURITY - Experimenting with Distributed Generation of RSA Keys Thierry Congos and Francois Lesueur - Protecting Mobile Code Privacy With Resilient Spy Agent Group Testing Georgios Kalogridis - Optimizing IRM with Automata Modulo Theory Fabio Massacci and Ida Sri Rejeki Siahaan September 25, 2009 ------------------ 9:00 - 10:00 Invited talk - Thesis on Security and Trust management Claudio A. Ardagna - ERCIM STM WG award for the best Ph.D. 10:00 - 10:30 REPUTATION MANAGEMENT - Challenges for Robust Trust and Reputation Systems Audun Josang and Jennifer Golbeck 10:30 - 11:00 Coffee break 11:00 - 12:30 ACCESS CONTROL AND USAGE CONTROL - A Multimodal view on Access Control and Trust Management: Fibred Security Language Guido Boella, Dov M. Gabbay, Valerio Genovese, and Leendert van der Torre - Detecting and Countering Insider Threats: Can Policy-Based Access Control Help? Jason Crampton and Michael Huth - Usage Control Enforcement with Data Flow Tracking for X11 Alexander Pretschner, Matthias Buchler, Matus Harvan, Christian Schaefer and Thomas Walter MORE INFORMATION Additional information about the conference can be found at http://stm09.dti.unimi.it/ _______________________________________________ p2p-hackers mailing list p2p-hackers@lists.zooko.com http://lists.zooko.com/mailman/listinfo/p2p-hackers