Home | Registration | Submissions | Program | Committees | Directions |
On October 19 and 20, the Conference Papers will be accessible at this link
9:15 - 9:45 | Registration |
9:45 - 10:00 | Welcome |
10:00 - 10:45 | William Winsborough Award |
10:45 - 11:00 | Break |
11:00 | User study of an ABAC model for online social networks |
Adi Swissa (The Open University), Ehud Gudes (Ben-Gurion University of the Negev) |
11:30 | Behavior-dependent access control policies |
Amour Shmuel (The Open University), Ehud Gudes (Ben-Gurion University of the Negev) |
12:00 - 13:00 | Lunch |
13:00 | Trust Level Evaluation Engine for Dynamic Trust Assessment with Reference to Subjective Logic |
Ana Petrovska (Huawei Technologies), Gabriele Gelardi (Huawei Technologies), H¨seyin Demirci (SnT/University of Luxembourg), Emre Koçyigit (SnT/University of Luxembourg), Gabriele Lenzini (SnT/University of Luxembourg), Artur Hermann (Ulm University), Nataša Trkulja (Ulm University), Frank Kargl (Ulm University), Ioannis Krontiris (Huawei Technologies), and Theo Dimitrakos (Huawei Technologies) |
13:30 | Software and its perceived trustworthiness |
Anirban Basu (Hitachi) and Satoshi Kai (Hitachi) |
14:00 | A Pre-Signature Scheme for Trustworthy Offline V2V Communication |
Dimah Almani (University of Nottingham), Tim Muller (University of Nottingham), Steven Furnell (University of Nottingham), Xavier Carpent (University of Nottingham), and Takahito Yoshizawa (KU Leuven) |
14:30 | Categorizing Review Helpfulness Using Abstract Dialectical Frameworks |
Atefeh Keshavarzi (CWI and VU University Amsterdam), Davide Ceolin (CWI) |
15:30 - 16:00 | Break |
16:00 | Panel discussion |
TBA |
17:00 | Drinks |
18:30 | Dinner at Maslow Cafe |
9:30 - 10:00 | Registration |
10:00 - 10:45 | IFIPTM Industrial Keynote: The Journey of Trust in Cloud Computing |
Yuecel Karabulut (Amazon Web Services) | |
At their core, many cloud security discussions ultimately distill to trust. In a decade since the rise of cloud computing, a lot of research has been done on the topic of security & trust in cloud computing. In this talk, we will discuss how the concept of trust between organizations (consumers of cloud) and public cloud vendors has been evolving and which technological innovations have been shaping the amount of trust needed to trust the cloud vendors. |
10:45 - 11:00 | Break |
11:00 | Why Zero Trust Architectures are Not Replacing Trust |
Christian Damsgaard Jensen (Technical University of Denmark) |
11:30 | Continuous Authorization Architecture for Dynamic Trust Evaluation |
Hussein Joumaa (Huawei Technologies Duesseldorf GmbH, University of Trento), Ana Petrovska (Huawei Technologies Duesseldorf GmbH), Ali Hariri (Huawei Technologies Duesseldorf GmbH, University of Trento), Theo Dimitrakos (Huawei Technologies Duesseldorf GmbH, University of Kent), and Bruno Crispo (University of Trento) |
12:00 - 13:00 | Lunch |
13:00 | Evaluation of Entity Trustworthiness Based on Public and Private Data |
Marc Sel (KU Leuven, University of London), Hasin Ishraq Reefat (University of Maryland), Naghmeh Karimi (University of Maryland), and Konstantinos Mersinas (KU Leuven) |
13:30 | A Difficulty in Trust Modelling |
Tim Muller (University of Nottingham) |
14:00 - 14:30 | Break |
14:30 - 15:30 | IFIP 11.11 WG meeting |
15:30 - 16:00 | Closing |