Program
Monday September 21
08:00 - 17:00 Registration
09:15 - 09:30 General Welcome
(Room: Lecture Hall C)09:30 - 10:30 Session 1: Quantitative Aspects of Security Assurance
(Room: Lecture Hall C, Chair: Fabio Martinelli)-
09:30-10:00 Composable Bounds on Information Flow from Distribution Differences.
By Megumi Ando and Joshua D. Guttman. -
10:00-10:30 Quantitative Analysis of Network Security
with Abstract Argumentation.
By Artsiom Yautsiukhin and Francesco Santini.
10:30 - 11:00 Coffee Break
11:00 - 12:30 Session 2: Security Assurance and Reputation
(Room: Lecture Hall C, Chair: Joaquin Garcia-Alfaro)-
11:00-11:30 Security-Based Runtime Adaptation of Multi-Cloud Applications.
By Kyriakos Kritikos and Philippe Massonet. -
11:30-12:00 AdIDoS - Adaptive and Intelligent Fully-Automatic Detection of
Denial-of-Service Weaknesses in Web Services.
By Christian Altmeier, Christian Mainka, Juraj Somorovsky and Jörg Schwenk. -
12:00-12:30 An integrated reward and reputation mechanism
for MCS preserving users privacy.
By Cristian Tanas, Sergi Delgado-Segura and Jordi Herrera-Joancomartí.
12:30 - 14:00 Lunch
14:00 - 15:30 Session 3 + Invited Talk DPM-QASA
(Room: Lecture Hall C, Chair: Fabio Martinelli)-
14:00-14:30 Stronger Security for Sanitizable Signatures.
By Stephan Krenn, Kai Samelin and Dieter Sommer. -
14:30-15:30 Invited Talk DPM-QASA
-
Title: Data Security and Privacy in the Cloud
By Pierangela Samarati (Università degli Studi di Milano, Italy).
15:30 - 16:00 Coffee Break
16:00-17:30 Session 4: Monetization and Data Management
(Room: Lecture Hall C, Chair: Guillermo Navarro-Arribas)-
16:00-16:30 Some Remarks and Ideas about Monetization of
Sensitive Data
By Ania M. Piotrowska and Marek Klonowski. -
16:30-17:00 A Novel Approach for Data Revocation on the Internet.
By Olga Kieselmann, Nils Kopal and Arno Wacker. -
17:00-17:20 Can You Really Anonymize the Donors of
Genomic Data in Today's Digital World? (Short Paper).
By Mohammed Alser, Nour Almadhoun, Azita Nouri, Can Alkan and Erman Ayday.
18:00-22:30 Workshop Dinner
Tuesday September 22
09:15 - 09:30 CyberICS & WOS-CPS Welcome
(Room: Lecture Hall C)09:30 - 10:30 Invited Joint Talk (CyberICS & WOS-CPS & DPM-QASA)
(Room: Lecture Hall C)-
Title: From SCADA Security to Adversarial Control Theory
By Dieter Gollman (Technischen Universität Hamburg, Germany)
10:30 - 11:00 Coffee Break
11:00 - 12:30 Session 5: Full and Short Papers
(Room: Lecture Hall C, Chair: Isaac Agudo)-
11:00-11:30 PerfectDedup: Secure Data Deduplication.
By Pasquale Puzio, Refik Molva, Melek Önen and Sergio Loureiro. -
11:30-11:50 User-centric privacy-preserving collection
and analysis of trajectory data (Short Paper).
By Cristina Romero-Tris and David Megías. -
11:50-12:10 The leaking battery: A privacy analysis of
the HTML5 Battery Status API (Short Paper).
By Lukasz Olejnik, Gunes Acar, Claude Castelluccia and Claudia Diaz. -
12:10-12:30 Secure Refactoring with Java Information Flow
(Short Paper).
By Steffen Helke, Florian Kammueller and Christian W. Probst.
12:30 - 14:00 Lunch
14:00 - 15:20 Session 6: Position and Short Papers
(Room: Lecture Hall C, Chair: Jordi Herrera-Joancomartí)-
14:00-14:20 Privacy Threats in E-Shopping (Position Paper).
By Jesus Diaz, Seung Geol Choi, David Arroyo, Angelos Keromytis, Francisco Rodriguez and Moti Yung. -
14:20-14:40 Comparison-based Privacy: Nudging Privacy in
Social Media (Position Paper).
By Jan Henrik Ziegeldorf, Martin Henze, Rene Hummen and Klaus Wehrle. -
14:40-15:00 You never surf alone. Ubiquitous tracking of users'
browsing habits (Short Paper).
By Silvia Puglisi, David Rebollo-Monedero and Jordi Forné. -
15:00-15:20 LockPic: Privacy Preserving Photo Sharing in Social Networks (Short Paper).
By Carlos Pares-Pulido and Isaac Agudo.
15:30 - 16:00 Coffee Break
16:00 - 17:30 Session 7: Biometrics and Privacy Preservation
(Room: Lecture Hall C, Chair: Joaquin Garcia-Alfaro)-
16:00-16:30 Privacy-Preserving Biometric Authentication and Matching
via Lattice-Based Encryption.
By Constantinos Patsakis, Jeroen van Rest, Michal Choras and Mélanie Bouroche. -
16:30-17:00 Comprehensive and Improved Secure Biometric
System using Homomorphic Encryption.
By Avradip Mandal, Arnab Roy and Masaya Yasuda. -
17:00-17:30 On the Privacy of Horizontally Partitioned
Binary Data-based Privacy-Preserving Collaborative Filtering.
By Murat Okkalioglu, Mehmet Koc and Huseyin Polat.