International Workshop on Trust
and Privacy in Digital Business
Tuesday, September 2, 2003
10:30-11:30:
Invited
talk:
"Compliant Cryptologic Protocols for Trusted Business"
by Ed Dawson, Queensland University of
Technology (QUT), Australia
11:30-12:30
"On
the Noninvertibility of Adaptive Digital Watermarking"
Xianfeng Zhao, Weinong
Wang, Kefei Chen
Deptartment of Computer Science, Shanghai
Jiaotong University, China
"Practical
Asymmetric Fingerprinting with a TTP"
Fransec Sebé 1, Antoni Martínez-Balleste 1, Joseph Domingo-Ferrer 1, Miguel Soriano 2
1 Deptartment of Computer Engineering and Maths, Universitat Rovira i
Virgili, Catalonia, Spain
2 Deptartment of
Telematics Engineering, Universitat Politecnica de Catalunya, Catalonia, Spain
14:00-15:30
"Some Protocols Useful on the Internet
from Threshold Signature Schemes"
Javier Herranz, Vanesa Daza, German Saez
Dept. Matematica Aplicada IV. Universitat Politecnica de Catalunya, Spain
"Fairness
in Wallets with Observer"
Heike Neumann, Thomas Schwarzpaul ,
Mathematical Institute, University of Giessen, Germany
"A protocol for programmable smart cards"
T. Cucinotta 1,
M. Di Natale 1, D. Corcoran 2
1 Scuola Superiore Sant’Anna, Pisa, Italy
2 Schlumberger Smart Card Research,
Austin (Texas), USA
15.30 –
16.00 Coffee Break
16:00-18:00
"Towards
Accountable Management of Identity and Privacy: Sticky Policies and Enforceable
Tracing Services"
Marco Casassa,
Siani Pearson, Pete Bramhall
Trusted
Systems Laboratory, Hewlett Packard Laboratories, UK
"Privacy
Implications of Trusted Computing"
Jason Reid 1,
Juan M Gonzalez Nieto 1, Ed Dawson 1, Eiji Okamoto 2
1 Information Security Research
Centre, Queensland University of Technology, Australia
2 Institute of Information Sciences
and Electronics, University of Tsukuba, Japan
"Privacy
in an Identity-based DRM System"
Claudine Conrado, Frank Kamperman, Geert Jan Schrijen, Willem Jonker
Philips
Research, Netherlands
"Towards
a Logic of Privacy-Preserving Selective Disclosure Credential Protocols"
Theodoros Balopoulos,
Stephanos Gritzalis
Department
of Information and Communication Systems Engineering University of the Aegean,
Samos, Greece
Wednesday, September 3, 2003
10:30-12:30
"Analysing
information security. Increasing trust by an appropriate information security
culture"
Thomas Schlienger, Stephanie Teufel
University
of Fribourg, Switzerland
"XenoTrust:
Event-based distributed trust management"
Boris
Dragovic, Evangelos Kotsovinos, Steven Hand, Peter Pietzuch
Computer
Laboratory, University of Cambridge, UK
"A
Coloured Petri Net Trust Model"
Peter Lory
Institut für Wirtschaftsinformatik, University of Regensburg, Germany
"Towards
a Model for Trust Relationships in Virtual Enterprises"
Nicola Mezzetti
Department
of Computer Science, University of Bologna, Italy
12.30 –
14.00 Lunch
Credentials
(I)
14:00-15:30
"Credential
negotiation with limited disclosure via iterative range refinement in an
unordered space"
David Eyers,
Ken Moody
Computer
Laboratory, University of Cambridge, UK
"A
Flexible Role-based Secure Messaging Service: Exploiting IBE Technology for
Privacy in Health Care"
Marco
Casassa, Pete Bramhall, Keith Harrison
Trusted
Systems Laboratory, Hewlett Packard Laboratories, UK
"Attribute-based
Interactions in a Distributed Authentication and Authorization
Infrastructure"
Diego R. López,
Rodrigo Castro-Rojo
RedIRIS,
Spain
15.30 –
16.00 Coffee Break
Protocols
(II)
16:00-18:00
"Amending
P3P for Clearer Privacy Promises"
Günter Karjoth, Matthias Schunter, Els Van Herreweghen, Michael Waidner
IBM
Research, Zurich Research Laboratory, Switzerland
"Evaluation
of Revocation Systems with a JAVA Test-bed"
Jose L.
Munoz, Jordi Forné, David Jodra, Oscar Esparza, Miguel Soriano
Technical
University of Catalonia, Telematics Engineering Department, Barcelona, Spain
"TTA:
Many-To-Many Source Authentication"
Xin Zhao,
Atul Prakash
University
of Michigan, USA
“Certified
E-mail Systems Using Public Notice Board"
Kenji Imamoto,
Kouichi Sakurai
Dept. of
Computer Science and Communication Engineering, Kyushu Univ. Japan
Thursday, September 4, 2003
10:30-12:30
"Electronic
Voting Systems: Security Implications of the Administrative Workflow"
Costas
Lambrinoudakis 1, Spyros Kokolakis 1, Vasilis Tsoumas 2,
Sokratis Katsikas 2, Dimitrios Gritzalis 2, Maria Karyda 2,
1 Department of Information and
Communication Systems Engineering University of the Aegean, Samos, Greece
2 Department of Informatics, Athens
University of Economics and Business, Athens, Greece
"Multivariate
Statistical Analysis of Network Traffic for Intrusion Detection"
Akira Kanaoka, Eiji Okamoto
University
of Tsukoba, Japan
"A
business process modelling approach to security requirements engineering"
Antonio Mańa 1, Jose A. Montenegro 1, Carsten Rudolph 2, Jose L. Vivas 3
1 Computer Sciense Department, E.T.S.,
Inginieria Informatica, Universidad Malaga, Spain
2 Fraunhofer Institute for Secure
Telecooperation - SIT, Darmstadt, Germany
3 Hewlett Packard Laboratories,
Bristol, UK
"Experiences
running a web anonymising service"
Claudia Golembiewski 1, Marit Hansen 1, Sandra Steinbrecher 2
1 Unabhängiges Landeszentrum für Datenschutz Schleswig-Holstein, Kiel, Germany
2 Institut für Informatik, Freie Universität Berlin, Germany
12.30 –
14.00 Lunch
Credentials
(II)
14:00-15:30
"FlexiCert:
Merging X.509 Identity Certificates and Attribute Certificates"
A. Lakshminarayanan,
Jianying Zhou
Institute
of Infocomm Research, Singapore
"Towards
Dynamically Administered Role-based Access Control"
Andreas K. Mattas
1, Ioannis K. Mavridis 2 , George I. Pangalos 1
1 Aristotle University of
Thessaloniki, Faculty of Technology, Computers Division, Thessaloniki, Greece
2 University of Macedonia, Department
of Applied Informatics, Thessaloniki, Greece
"Delegation
in Distributed Systems: Challenges and Open Issues"
Óscar Cánovas 1, Antonio F. Gómez 2
1 Department of Computer Engineering,
University of Murcia, Spain
2 Department of Information and
Communications Engineering, University of Murcia, Spain