[Om-announce] STM 2013 Call for Participation (early registration by August 14, 2013)

Giovanni Livraga giovanni.livraga at unimi.it
Fri Aug 9 23:45:26 CEST 2013


[Apologies if you receive multiple copies of this message]


*** Early registration fees apply until August 14, 2013 ***


CALL FOR PARTICIPATION


**********************************************************************
9th Workshop on Security and Trust Management (STM 2013)
RHUL, Egham, U.K. -- September 12-13, 2013
https://sites.google.com/site/sectrustmgmt2013/
Co-located with ESORICS 2013
**********************************************************************


ABOUT THE WORKSHOP
The 9th 9th Workshop on Security and Trust Management will be held in
RHUL, Egham, U.K., on September 12 and 13, 2013.  The goal of the
workshop is to promote progress and novel research on all theoretical
and practical aspects of security and trust in ICT by providing a
forum for researchers and practitioners coming from academia,
industry, and government.

The workshop features 3 invited talks and 15 contributed papers. The
full programme will be available soon at the workshop website.

STM 2013 will be co-located with the 18th European Symposium on
Research in Computer Security (ESORICS 2013) held 9th-13th September
2013.  
 

REGISTRATION
For online registration, please visit:
http://esorics2013.isg.rhul.ac.uk/registration/
 
Please refer to the ESORICS conference website 
(http://esorics2013.isg.rhul.ac.uk/)for registration, accommodation, 
and travel information.


INVITED TALKS
 - Claire Vishik, Intel Corporation, U.K.
      Building trusted systems: lessons of the first generation of
      Trusted Computing

 - Michael Huth, Imperial College, London, U.K.
      Verifiable numerical aggregation of trust evidence for
      policy-based access control

 - Winner of the 2013 ERCIM WG STM Best PhD Thesis Award
      The title of the selected PhD thesis will be announced on August
      18, 2013


CONTRIBUTED PAPERS
 - Marco Botta, Davide Cavagnino, and Victor Pomponiu.                          
      Weighted-Sum Fragile Watermarking in the Karhunen-Loève Domain

 - Mauro Conti, Nicola Dragoni, and Sebastiano Gottardo.           
      MITHYS: Mind The Hand You Shake - Protecting mobile devices from
      SSL usage vulnerabilities

 - Alessandra De Benedictis, Behzad Koosha, Massimiliano Albanese, and
   Valentina Casola.
      A Probabilistic Framework for Distributed Localization of
      Attackers in MANETs

 - Constantinos Delakouridis and Christos Anagnostopoulos.           
      On Enhancement of ‘Share The Secret’ Scheme for Location Privacy

 - Marco Rocchetto, Luca Viganò, Marco Volpe, and Giacomo Dalle Vedove.        
      Using Interpolation for the Verification of Security Protocols

 - Ana Ferreira, Jean-Louis Huynen, Vincent Koenig, Gabriele Lenzini,
   and Salvador Rivas.
      Socio-technical study on the effect of Trust and Context when
      choosing WiFi names

 - Javier Franco-Contreras, Gouenou Coatrieux, Nora Cuppens-Boulahia,
   Fréderic Cuppens, and Christian Roux.
      Authenticity Control of Relational Databases by Means of
      Lossless Watermarking Based on Circular Histogram Modulation

 - Thomas Koslowski and Christian Zimmermann.
      Towards a Detective Approach to Business Process-centered
      Resilience

 - Peeter Laud and Alisa Pankova.                        
      New Attacks against Transformation-Based Privacy-Preserving
      Linear Programming

 - Yannis Mallios, Lujo Bauer, Dilsun Kaynar, Fabio Martinelli, and
   Charles Morisset.
      Probabilistic Cost Enforcement of Security Policies

 - Alexios Mylonas, Nikolaos Tsalis, and Dimitris Gritzalis.    
      Evaluating the manageability of web browsers controls

 - Ryan Riley, Chris Clifton, and Qutaibah Malluhi.
      Maintaing Database Anonymity in the Presence of Queries

 - Lil Maria Rodriguez-Henriquez and Debrup Chakraborty.
      RDAS: A Symmetric Key Scheme for Authenticated Query Processing
      in Outsourced Databases

 - Thomas Stocker and Frank Böhr.
      IF-Net: A Meta-model for Security-oriented Process Specification

 - Nik Sultana, Moritz Y. Becker, and Markulf Kohlweiss.
      Selective Disclosure in Datalog-based Trust Management



More information about the Om-announce mailing list