International Workshop on Security In Information Systems
WOSIS-2006

Wednesday May 24th


Tuesday Wednesday


Chairs: Eduardo Fernández-Medina and Mariemma I. Yagüe


9:00
9:00 - 10:30
Session 4 - Security Requirements and Patterns II
  • Towards a UML 2.0 Profile for RBAC Modeling in Activity Diagrams
    Alfonso Rodríguez, Eduardo Fernández-Medina and Mario Piattini
     
  • SECTET – An Extensible Framework for the Realization of Secure Inter-Organizational Workflows
    Michael Hafner, Ruth Breu, Berthold Agreiter and Andrea Nowak
     
  • Security Patterns Related to Security Requirements
    David G. Rosado, Carlos Gutiérrez, Eduardo Fernández-Medina and Mario Piattini
     
  • The Place and Role of Security Patterns in Software Development Process
    Oleksiy Mazhelis and Anton Naumenko
10:30 Coffee-break (10:30 - 11:00)
11:00
11:00 - 13:00
Session 5 - Cryptography and Multimedia Systems
  • Names in Cryptographic Protocols
    Simone Lupetti, Feike W. Dillema and Tage Stabell-Kulø
     
  • Robust-audio-hash Synchronized Audio Watermarking
    Martin Steinebach, Sascha Zmdzinski and Sergey Neichtadt
     
  • A New Method for Embedding Secret Data to the Container Image Using ‘Chaotic’ Discrete Orthogonal Transforms
    Vladimir Chernov and Oleg Bespolitov
     
  • Protecting Notification of Events in Multimedia Systems
    Eva Rodríguez, Silvia Llorente and Jaime Delgado
13:00 Lunch (13:00 - 14:30)
14:30
14:30 - 16:30
Session 6 - Authentication & Authorization 
  • Analyzing Preauthentication Timestamps To Crack Kerberos V Passwords
    Ahmed Alazzawe, Anis Alazzawe, Asad Nawaz and Duminda Wijesekera
     
  • Grid Authorization Based on Existing AAA Architectures
    Manuel Sánchez, Gabriel López, Óscar Cánovas and Antonio F. Gómez-Skarmeta
     
  • A Distributed Kerberized Access Architecture for Real Time Grids
    A. Moralis, A. Lenis, M. Grammatikou, S. Papavassiliou and B. Maglaris
16:30 Coffee-break (16:30 - 17:00)
17:00
17:00 - 18:30
Session 7 - Smart Cards Applications
  • A Secure Universal Loyalty Card
    Sébastien Canard, Fabrice Clerc and Benjamin Morin
     
  • The Software Infrastructure of a Java Card Based Security Platform for Distributed Applications
    Serge Chaumette, Achraf Karray and Damien Sauveron
     
  • Secure Deployment of Applications to Fielded Devices and Smart Cards
    William G. Sirett, John A. MacDonald, Keith Mayes and
    Konstantinos Markantonakis