15th International Conference on Trust, Privacy and Security in Digital Business (TrustBus 2018 )
- An Inquiry into Perception and Usage of Smartphone Permission Models
Lena Reinfelder, Andrea Schankin, Sophie Russ, Zinaida Benenson - On the Hardness of Separation of Duties Problems for Cloud Databases
Ferdinand Bollwein, Lena Wiese - Three Tales of Disillusion: Benchmarking Property Preserving Encryption Schemes
Frank Pallas, Martin Grambow - "Spatial Trajectory Analytics: Past, Present and Future"
Xiaofang Zhou, The University of Queensland, Australia
- Evaluating the privacy properties of secure VoIP metadata
João S. Resende, Patrícia R. Sousa, Luís Antunes - Can Spatial Transformation-Based Privacy Preservation Compromise Location Privacy?
Anand Paturi, Subhasish Mazumdar - Towards an Effective Privacy Impact and Risk Assessment Methodology: Risk Assessment
Majed Alshammari, Andrew Simpson - PERSUADED: Fighting Social Engineering Attacks with a Serious Game
Dina Aladawy, Kristian Beckers, Sebastian Pape - Phishing Detection: Developing and Evaluating a Five Minutes Security Awareness Video
Melanie Volkamer, Karen Renaud, Benjamin Maximilian Reinheimer, Philipp Rack, Marco Ghiglieri, Peter Mayer, Alexandra Kunz, Nina Gerber - Biometrically Linking Document Leakage to the Individuals Responsible
Abdulrahman Alruban, Nathan Clarke, Fudong Li, Steven Furnell - A Decision-Making Approach for Improving Organizations’ Cloud Forensic Readiness
Stavros Simou, Ioannis Troumpis, Christos Kalloniatis, Dimitris Kavroudakis, Stefanos Gritzalis - Towards Blockchain-based Identity and Access Management for Internet of Things in Enterprises
Martin Nuss, Alexander Puchta, Michael Kunz - Access control requirements for physical spaces protected by virtual perimeters
Brian Greaves, Marijke Coetzee, Wai Sze Leung - Towards the Definition of a Security Incident Response Modelling Language
Myrsini Athinaiou, Haralambos Mouratidis, Michalis Pavlidis , Theo Fotis, Emmanouil Panaousis - "The General Data Protection Regulation (GDPR) era: Ten steps for compliance of Data Processors and Data Controllers - What about the Users ?"
Costas Lambrinoudakis, University of Piraeus, Greece
- An Enhanced Cyber Attack Attribution Framework
Nikolaos Pitropakis, Emmanouil Panaousis, Alkiviadis Giannakoulias, George Kalpakis, Rodrigo Diaz Rodriguez, Panayiotis Sarigiannidis - A comprehensive methodology for deploying IoT honeypots
Antonio Acien, Ana Nieto, Gerardo Fernandez, Javier Lopez - Trustworthiness Cases – Toward Preparation for the Trustworthiness Certification
Nazila Gol Mohammadi, Nelufar Ulfat-Bunyadi, Maritta Heisel
September 5, 2018
09:00 - 10:30
09:00 - 10:30
TrustBus - Session 1 : Permission models and cloud
Session Chair : Günther Pernul
September 5, 2018
10:30 - 11:00
10:30 - 11:00
Coffee Break
September 5, 2018
11:00 - 12:00
11:00 - 12:00
Keynote Talk
Session Chair : Sven Hartmann
September 5, 2018
12:00 - 13:30
12:00 - 13:30
Lunch
September 5, 2018
13:30 - 15:00
13:30 - 15:00
TrustBus - Session 2 : Privacy
Session Chair : Melanie Volkamer
September 5, 2018
15:00 - 15:30
15:00 - 15:30
Coffee Break
September 5, 2018
15:30 - 17:30
15:30 - 17:30
TrustBus - Session 3 : Proactive security measures
Session Chair : Subhasish Mazumdar
September 6, 2018
09:00 - 10:30
09:00 - 10:30
TrustBus - Session 4 : Cyber Physical Systems I
Session Chair : Nikolaos Pitropakis
September 6, 2018
10:30 - 11:00
10:30 - 11:00
Coffee Break
September 6, 2018
11:00 - 12:00
11:00 - 12:00
Keynote Talk
Session Chair : Günther Pernul
September 6, 2018
12:00 - 13:30
12:00 - 13:30
Lunch
September 6, 2018
13:30 - 15:00
13:30 - 15:00
TrustBus - Session 5 : Cyber Physical Systems II
Session Chair : Marijke Coetzee
September 6, 2018
15:00 - 15:30
15:00 - 15:30