[Apologies if you receive multiple copies of this message]

                          CALL FOR PARTICIPATION

----------------------------------------------------------------------
5th International Workshop on Security and Trust Management (STM 2009)
               Saint Malo, France -- September 24-25, 2009
                        http://stm09.dti.unimi.it
----------------------------------------------------------------------


ABOUT THE CONFERENCE

STM (Security and Trust Management) is a established working group of
ERCIM (European Research Consortium in Informatics and Mathematics).
STM 2009 is the fifth workshop in this series and will be held in
Saint Malo, France, in conjunction with ESORICS 2009 (14th European
Symposium on Research in Computer Security). STM has the following aims:

- to investigate the foundations and applications of security and trust
   in ICT;
- to study the deep interplay between trust management and common security
   issues such as confidentiality, integrity, and availability;
- to identify and promote new areas of research connected with security
   management (e.g. dynamic and mobile coalition management, P2P, MANETs,
   Web/GRID services);
- to identify and promote new areas of research connected with trust
   management (e.g., reputation, recommendation, and collaboration);
- to provide a platform for presenting and discussing emerging ideas and
   trends.

The 5th Security and Trust Management Workshop (STM 2009) will be held
in Saint Malo, France.


REGISTRATION

Registration information is available at
http://stm09.dti.unimi.it/registration.php


PROGRAM

September 24, 2009
------------------

9:00 - 10:30 Business meeting

10:30 - 11:00 Coffee break

11:00 - 12:00 Invited talk - TBA

12:00 - 12:30 INFORMATION SECURITY MANAGEMENT

- Information Security Management: A Collaborative Approach
   Frank Innerhofer-Oberperfler, Daniel Bachlechner, Ronald Maier,
   Verena Hahn, Manuela Weitlaner, and Ruth Breu

12:30 - 14:00 Lunch

14:00 - 15:30 SOCIAL NETWORKS AND TRUST

- A Measurement of Mixing Time in Social Networks
   Matteo Dell'Amico and Yves Roudier

- Resource access in Multi-Provider Networks using Role Based
   Trust Management
   Paolo Mori, Maurizio Colombo, Fabio Martinelli, Barbara Martini,
   Fabio Baroncelli, and Piero Castoldi

- Distinguishing Fact and Fiction: Data Mining Online Identities
   Roya Feizy, Ian Wakeman, and Dan Chalmers

15:30 - 16:00 Coffee break

16:00 - 17:30 CRYPTOGRAPHY, PRIVACY AND LANGUAGE-BASED SECURITY

- Experimenting with Distributed Generation of RSA Keys
   Thierry Congos and Francois Lesueur

- Protecting Mobile Code Privacy With Resilient Spy Agent Group Testing
   Georgios Kalogridis

- Optimizing IRM with Automata Modulo Theory
   Fabio Massacci and Ida Sri Rejeki Siahaan


September 25, 2009
------------------

9:00 - 10:00 Invited talk

- Thesis on Security and Trust management
   Claudio A. Ardagna - ERCIM STM WG award for the best Ph.D.

10:00 - 10:30 REPUTATION MANAGEMENT

- Challenges for Robust Trust and Reputation Systems
   Audun Josang and Jennifer Golbeck

10:30 - 11:00 Coffee break

11:00 - 12:30 ACCESS CONTROL AND USAGE CONTROL

- A Multimodal view on Access Control and Trust Management:
   Fibred Security Language
   Guido Boella, Dov M. Gabbay, Valerio Genovese,
   and Leendert van der Torre

- Detecting and Countering Insider Threats: Can Policy-Based
   Access Control Help?
   Jason Crampton and Michael Huth

- Usage Control Enforcement with Data Flow Tracking for X11
   Alexander Pretschner, Matthias Buchler, Matus Harvan,
   Christian Schaefer and Thomas Walter


MORE INFORMATION

Additional information about the conference can be found at
http://stm09.dti.unimi.it/








_______________________________________________
p2p-hackers mailing list
p2p-hackers@lists.zooko.com
http://lists.zooko.com/mailman/listinfo/p2p-hackers

Reply via email to