[Apologies if you receive multiple copies of this message]
*** Early registration fees apply until August 14, 2013 *** CALL FOR PARTICIPATION ********************************************************************** 9th Workshop on Security and Trust Management (STM 2013) RHUL, Egham, U.K. -- September 12-13, 2013 https://sites.google.com/site/sectrustmgmt2013/ Co-located with ESORICS 2013 ********************************************************************** ABOUT THE WORKSHOP The 9th 9th Workshop on Security and Trust Management will be held in RHUL, Egham, U.K., on September 12 and 13, 2013. The goal of the workshop is to promote progress and novel research on all theoretical and practical aspects of security and trust in ICT by providing a forum for researchers and practitioners coming from academia, industry, and government. The workshop features 3 invited talks and 15 contributed papers. The full programme will be available soon at the workshop website. STM 2013 will be co-located with the 18th European Symposium on Research in Computer Security (ESORICS 2013) held 9th-13th September 2013. REGISTRATION For online registration, please visit: http://esorics2013.isg.rhul.ac.uk/registration/ Please refer to the ESORICS conference website (http://esorics2013.isg.rhul.ac.uk/)for registration, accommodation, and travel information. INVITED TALKS - Claire Vishik, Intel Corporation, U.K. Building trusted systems: lessons of the first generation of Trusted Computing - Michael Huth, Imperial College, London, U.K. Verifiable numerical aggregation of trust evidence for policy-based access control - Winner of the 2013 ERCIM WG STM Best PhD Thesis Award The title of the selected PhD thesis will be announced on August 18, 2013 CONTRIBUTED PAPERS - Marco Botta, Davide Cavagnino, and Victor Pomponiu. Weighted-Sum Fragile Watermarking in the Karhunen-Loève Domain - Mauro Conti, Nicola Dragoni, and Sebastiano Gottardo. MITHYS: Mind The Hand You Shake - Protecting mobile devices from SSL usage vulnerabilities - Alessandra De Benedictis, Behzad Koosha, Massimiliano Albanese, and Valentina Casola. A Probabilistic Framework for Distributed Localization of Attackers in MANETs - Constantinos Delakouridis and Christos Anagnostopoulos. On Enhancement of ‘Share The Secret’ Scheme for Location Privacy - Marco Rocchetto, Luca Viganò, Marco Volpe, and Giacomo Dalle Vedove. Using Interpolation for the Verification of Security Protocols - Ana Ferreira, Jean-Louis Huynen, Vincent Koenig, Gabriele Lenzini, and Salvador Rivas. Socio-technical study on the effect of Trust and Context when choosing WiFi names - Javier Franco-Contreras, Gouenou Coatrieux, Nora Cuppens-Boulahia, Fréderic Cuppens, and Christian Roux. Authenticity Control of Relational Databases by Means of Lossless Watermarking Based on Circular Histogram Modulation - Thomas Koslowski and Christian Zimmermann. Towards a Detective Approach to Business Process-centered Resilience - Peeter Laud and Alisa Pankova. New Attacks against Transformation-Based Privacy-Preserving Linear Programming - Yannis Mallios, Lujo Bauer, Dilsun Kaynar, Fabio Martinelli, and Charles Morisset. Probabilistic Cost Enforcement of Security Policies - Alexios Mylonas, Nikolaos Tsalis, and Dimitris Gritzalis. Evaluating the manageability of web browsers controls - Ryan Riley, Chris Clifton, and Qutaibah Malluhi. Maintaing Database Anonymity in the Presence of Queries - Lil Maria Rodriguez-Henriquez and Debrup Chakraborty. RDAS: A Symmetric Key Scheme for Authenticated Query Processing in Outsourced Databases - Thomas Stocker and Frank Böhr. IF-Net: A Meta-model for Security-oriented Process Specification - Nik Sultana, Moritz Y. Becker, and Markulf Kohlweiss. Selective Disclosure in Datalog-based Trust Management _______________________________________________ Om-announce mailing list [email protected] http://openmath.org/mailman/listinfo/om-announce
