[Apologies if you receive multiple copies of this message]

                          CALL FOR PARTICIPATION

***********************************************************************
      23rd International Information Security Conference (SEC 2008)
            co-located with IFIP World Computer Congress 2008
                   Milan, Italy - September 8-10, 2008
                       http://sec2008.dti.unimi.it
***********************************************************************


ABOUT THE CONFERENCE

IFIP International Information Security Conference is the IFIP TC-11
(Technical Committee on Security & Protection in Information
Processing Systems) flagship conference. The conference is an
international forum for information security researchers and attracts
an international audience from the academic, industrial, and
governmental communities.

The 2008 edition is co-located with IFIP World Computer Congress 2008
and will take place in Milan, Italy, at Milano Convention Centre.


PROGRAM

Monday, September 8, 2008
-------------------------
09:15 - 09:30 Welcome and Opening

09:30 - 10:30 Invited talk
Prof. Francesco Pizzetti, President of the Italian Data Protection
Authority

10:30 - 11:00 Coffee break

11:00 - 12:30
Session 1: Privacy Protection
        - Hiding in Groups: On the Expressiveness of Privacy Distributions
          Karsten Nohl and David Evans
        - Practical Privacy-Preserving Benchmarking
          Florian Kerschbaum
        - Enhancing Privacy in Remote Data Classification
          A. Piva, C. Orlandi, M. Caini, T. Bianchi, and M. Barni
        
Session 2: Web Applications Security and Malware
        - Minimizing SSO Effort in Verifying SSL Anti-phishing Indicators
          Yongdong WU, Haixia Yao, and Feng Bao
        - Robbing Banks with Their Own Software-an Exploit against
          Norwegian Online Banks
          Yngve Espelid, Lars-Helge Netland, André N. Klingsheim,
          and Kjell J. Hole
        - Collaborative Architecture for Malware Detection and Analysis
          Michele Colajanni, Daniele Gozzi, and Mirco Marchetti
        
12:30 - 14:30 Lunch

14:30 - 16:00
Session 3: Sensor and Wireless Security
        - Realizing Stateful Public Key Encryption in Wireless Sensor
          Network
          Joonsang Baek, Han Chiang Tan, Jianying Zhou, and Jun Wen Wong
        - Establishing Secure Links in Low-rate Wireless Personal Area
          Networks
          Maurizio Adriano Strangio
        - An Asynchronous Node Replication Attack in Wireless Sensor
          Networks
          Jianying Zhou, Tanmoy Kanti Das, and Javier Lopez
        
Session 4: Security Policies
        - A B Formal Framework for Security Developments in the Domain of
          Smart Card Applications
          Frédéric Dadeau, Marie-Laure Potet, and Régis Tissot
        - An Implementation of a Privacy Enforcement Scheme based on the
          Java Security Framework using XACML Policies
          Thomas Scheffler, Stefan Geiss, and Bettina Schnor
        - Negotiation of Prohibition: an Approach Based on Policy Rewriting
          Nora Cuppens-Boulahia, Frédéric Cuppens, Diala Abi Haidar,
          and Hervé Debar
        
16:00 - 16:30 Coffee break

16:30 - 18:00
Session 5: Access Control in Distributed Systems
        - An Integrity Lock Architecture for Supporting Distributed
          Authorizations in Database Federations
          Wei Li, Lingyu Wang, Bo Zhu, and Lei Zhang
        - Role Signatures for Access Control in Open Distributed Systems
          Jason Crampton and Hoon Wei Lim
        - Policies and Security Aspects For Distributed Scientific
          Laboratories
          Nicoletta Dessì, Maria Grazia Fugini, and R. A. Balachandar
        
Session 6: Intrusion Detection
        - A Fuzzy Model for the Composition of Intrusion Detectors
          Inez Raguenet and Carlos Maziero
        - Investigating the Problem of IDS False Alarms: an Experimental
          Study Using Snort
          G. C. Tjhai, M. Papadaki, S. M. Furnell, and N. L. Clarke
        - User Session Modeling for Effective Application Intrusion
          Detection
          Kapil Kumar Gupta, Baikunth Nath (Sr. MIEEE),
          and Kotagiri Ramamohanarao


Tuesday, September 9, 2008
--------------------------

09:00 - 10:30 Invited talk
TBA

10:30 - 11:00 Coffee break

11:00 - 12:30
Session 7: Anomaly Detection
        - A Product Machine Model for Anomaly Detection of Interposition
          Attacks on Cyber-Physical Systems
          Carlo Bellettini and Julian L. Rrushi
        - Anomaly Detection with Diagnosis in Diversified Systems using
          Information Flow Graphs
          Frédéric Majorczyk, Eric Totel, Ludovic Mé, and Ayda Saidane
        - Behavioral Intrusion Detection Indicators
          Jacques Saraydaryan, Luc Paffumi, Véronique Legrand,
          and Stephane Ubeda
        
Session 8: Role Mining and Content Protection
        - Leveraging Lattices to Improve Role Mining
          Alessandro Colantonio, Roberto Di Pietro, and Alberto Ocello
        - A Parallelization Framework for Exact Knowledge Hiding in
          Transactional Databases
          Aris Gkoulalas-Divanis and Vassilios S. Verykios
        - Efficient Coalition Detection in Traitor Tracing
          Hongxia Jin, Jeffery Lotspiech, and Nimrod Megiddo
        
12:30 - 14:30 Lunch

14:30 - 16:00
Session 9: VoIP and Network Security
        - SPIT Identification Criteria Implementation: Effectiveness and
          Lessons Learned
          S. Dritsas, Y. Soupionis, M. Theoharidou, Y. Mallios,
          and D. Gritzalis
        - Detecting More SIP Attacks on VoIP Services by Combining Rule
          Matching and State Transition Models
          Dongwon Seo, Heejo Lee, and Ejovi Nuwere
        - A Decentralized Bayesian Attack Detection Algorithm for Network
          Security
          Kien C. Nguyen, Tansu Alpcan, and Tamer Basar
        
Session 10: Network Devices Security and Cyber Warfare
        - An Operation-Based Metric for DPA Resistance
          J. Pan, J. I. den Hartog, and E. P. de Vink
        - YASIR: A Low-Latency, High-Integrity Security Retrofit for Legacy
          SCADA Systems
          Patrick P. Tsang and Sean W. Smith
        - Adversary Modeling and Simulation in Cyber Warfare
          Samuel N. Hamilton and Wendy L. Hamilton
        
16:00 - 16:30 Coffee break

16:30 - 18:00
Session 11: Short papers
        - HoneyID : Unveiling Hidden Spywares by Generating Bogus Events
          Jeheon Han, Jonghoon Kwon, and Heejo Lee
        - A Security Protocol for Self-Organizing Data Storage
          Nouha Oualha, Melek Önen, and Yves Roudier
        - Protecting Financial Institutions from Brute-Force Attacks
          Cormac Herley and Dinei Florencio
        - Agency Theory: Can It Be Used to Strengthen IT Governance?
          Shaun Posthumus and Rossouw von Solms
        - A new Accounting Mechanism for Modern and Future AAA Services
          Alexandros Tsakountakis, Georgios Kambourakis,
          and Stefanos Gritzalis
        - A User Survey on The Sense of Security, Anshin
          Yasuhiro Fujihara, Yuko Murayama, and Kentarou Yamaguchi
        
Session 12: Short papers
        - Multi-Layer Encryption for Multi-Level Access Control in Wireless
          Sensor Networks
          Po-Yuan Teng, Shih-I Huang, and Adrian Perrig
        - A Comparative Study of Anomaly Detection Techniques in Web Site
          Defacement Detection
          Giorgio Davanzo, Eric Medvet, and Alberto Bartoli
        - Managing the Lifecycle of XACML Delegation Policies in Federated
          Environments
          Manuel Sánchez, Oscar Cánovas, Gabriel López,
          and Antonio F. Gómez-Skarmeta
        - Assessing the Likelihood of Privacy Policy Compliance
          George O.M. Yee, Larry Korba, and Ronggong Song
        - Classification Features for Detecting Server-side and Client-side
          Web Attacks
          Benferhat Salem and Tabia Karim


Wednesday, September 10, 2008
-----------------------------

09:00 - 10:30
Session 13: Security Compliance
        - Interactive Selection of ISO 27001 Controls under Multiple
          Objectives
          Thomas Neubauer, Andreas Ekelhart, and Stefan Fenz
        - Feasibility of Automated Information Security Compliance Auditing
          Longley D., Branagan M., Caelli W. J., and Kwok LF
        - Software Licence Protection and Management for Organisations
          Muntaha Alawneh and Imad M. Abbadi
        
Session 14: Risk and Security Analysis
        - A Vulnerability Prioritization System Using A Fuzzy Risk Analysis
          Approach
          Maxwell G. Dondo
        - ASTRA: A Security Analysis Method Based on Asset Tracking
          Daniel Le Métayer and Claire Loiseaux
        - A Knowledge-Based Bayesian Model for Analyzing a System after an
          Insider Attack
          Qutaibah Althebyan and Brajendra Panda
        
10:30 - 11:00 Coffee break

11:00 - 12:30
Session 15: Identity and Trust Management
        - Portable User-Centric Identity Management
          Gail-Joon Ahn, Moo Nam Ko, and Mohamed Shehab
        - Ubiquitous Privacy-Preserving Identity Management
          Kristof Verslype and Bart De Decker
        - Facilitating Privacy Related Decisions in Different Privacy
          Contexts on the Internet By Evaluating Trust in Recipients of
          Private Data
          Indrajit Ray and Sudip Chakraborty
        
Session 16: Virtualization and Digital Forensics
        - Using Virtualization to Create and Deploy Computer Security Lab
          Exercises
          Brian Hay, Ronald Dodge, and Kara Nance
        - DigForNet: Digital Forensic in Networking
          Slim Rekhis, Jihene Krichene, and Noureddine Boudriga
        - A Live Digital Forensic System for Windows Network
          Roberto Battistoni, Alessandro Di Biagio, Roberto Di Pietro,
          Matteo Formica, and Luigi V. Mancini



MORE INFORMATION
Additional information about the conference can be found at
http://sec2008.dti.unimi.it



No virus found in this outgoing message.
Checked by AVG - http://www.avg.com 
Version: 8.0.138 / Virus Database: 270.6.3/1610 - Release Date: 13/08/2008 16.14

_______________________________________________
p2p-hackers mailing list
[email protected]
http://lists.zooko.com/mailman/listinfo/p2p-hackers

Reply via email to