|
TrustBus ProgramTuesday, 4 September 200709:00 – 09:10 Opening – Welcome 09:10 – 11:10 Session 1: Secure and Trusted Virtual Organisations Recognition of Authority in Virtual Organisations Securing VO Management Addressing Cultural Dissimilarity in the Information Security Management Outsourcing Relationship Specification of the TrustMan System for Assisting Management of VBEs 11:10 – 11:30 Coffee Break 11:30 – 12:30 Keynote talk 12:30 – 14:00 Lunch 14:00 – 15:30 Session 2: Privacy in Digital Business A Privacy-Preserving Buyer-Seller Watermarking Protocol with Semi-Trust Third Party Towards Automatic Assembly of Privacy-Preserved Intrusion Signatures Privacy Assurance: Bridging the Gap between Preference and Practice 15:30 – 16:00 Coffee Break 16:00 – 17:30 Panel Discussion “Managing Digital Identities – Challenges and Opportunities” Panelists: Marco Casassa Mont (Hewlett-Packard Laboratories, UK) Wednesday, 5 September 200709:00 – 11:00 Session 3: Identity Management and Usage Control Enhancing Optimistic Access Controls with Usage Control Usage Control in Service-Oriented Architectures On Device-based Identity Management in Enterprises Analysis-Level Classes from Secure Business Processes through Model Transformations 11:00 – 11:30 Coffee Break 11:30 – 12:30 TrustBus’07 Keynote Talk Privacy-Enhanced Personalization 12:30 – 14:00 Lunch 14:00 – 15:30 Session 4: Authentication and Access Control A Trust and Context Aware Access Control Model for Web Services Conversations Design and Implementation of Distributed Access Control Infrastructures for Federations of Autonomous Domains On Device Authentication in Wireless Networks: Present Issues and Future Challenges 15:30 – 16:00 Coffee Break 16:00 – 17:30 Session 5: Compliance and User Privacy The Meaning of Logs Data Protection and Privacy Laws in the Light of RFID and Emerging Technologies Consistency of User Attribute in Federated Systems 17:30 – 22:00 Gala Dinner Thursday, 6 September 200709:00 – 11:00 Session 6: Policy Management Pre-Execution Security Policy Assessment of Remotely Defined BPEL-Based Grid Processes Situation-based Policy Enforcement Using Purpose Lattices to Facilitate Customisation of Privacy Agreements A Pattern-Driven Framework for Monitoring Security and Dependability 11:00 – 11:30 Coffee Break 11:30 – 12:30 Keynote Talk 12:30 – 14:00 Lunch 14:00 – 15:30 Session 7: Secure System Management Security Aspects for Secure Download of Regulated Software Using the Lens of Circuits of Power in Information Systems Security Management Fuzzy Service Selection and Interaction Review in Distributed Electronic Markets 15:30 – 16:00 Coffee Break 16:00 – 18:00 Session 8: Security and Trust X316 Security Toolbox for New Generation of Certificate Detecting Malicious SQL Trusted Code Execution in JavaCard How to Use ISO/IEC 24727-3 with Arbitrary Smart Cards 18:00 – 18:15 Conference Closing |
ANNOUNCEMENTSInvited TalksFor detailed information of Keynote Talks please click here. RegistrationTo avoid Monday morning queues the registration desk will be open on Sunday 15.00-17.00 |