08:30 |
Welcome Desk & Registration (08:30 - 09:10) |
09:10 |
-
2:
A Comparative Review of Cloud Security Proposals with ISO/IEC 27002
Oscar Rebollo, Daniel Mellado and Eduardo Fernández-Medina
-
5:
Accessing Cloud through API in a More Secure and Usable Way
HongQian Karen Lu
-
14:
An efficient Security Solution for Dealing with Shortened URL Analysis
Jaime Devesa, Xabier Cantero, Gonzalo Alvarez and Pablo G. Bringas
|
11:00 |
Coffee-Break (11:00 - 11:15) |
11:15 |
-
18:
A Privacy Model for Social Networks
Alban Gabillon
-
20:
Enhancing Cooperation in Wireless Vehicular Networks
J. Molina-Gil, P. Caballero-Gil and C. Caballero-Gil
|
12:15 |
Lunch (12:15 - 13:45) |
13:45 |
-
13:
Towards a Pattern-Based Security Methodology to Build Secure Information Systems
Roberto Ortiz, Santiago Moral-Rubio, Javier Garzás and Eduardo Fernández-Medina
-
6:
A Trusted Routing Based Service Discovery Protocol with Backup Nodes in MANETs
Min-Hua Shao, Yi-Ping Lee, Yen-Fen Hou and Cheng-Yi Ho
-
10:
Enhancing Cryptographic Code Against Side Channel Cryptanalysis With Aspects
Jérôme Dossogne and Stephane Fernandes Medeiros
-
29:
Implementation of the Finite Automaton Public Key Cryptosystem on FPGA
Dina Satybaldina, Altynbek Sharipbayev and Aigul Adamova
-
4:
Security Pattern Mining: Systematic Review and Proposal
Santiago Moral-García, Santiago Moral-Rubio and Eduardo Fernández-Medina
|
15:45 |
Coffee-Break (15:45 - 16:00) |
16:00 |
-
26:
Towards a Semantic Web-enabled Knowledge Base to Elicit Security Requirements for Misuse Cases
Haibo Hu, Dan Yang, Hong Xiang, Li Fu, Chunxiao Ye and Ren Li
-
11:
Expert Assessment on the Probability of Successful Remote Code Execution Attacks
Hannes Holm, Teodor Sommestad, Ulrik Franke and Mathias Ekstedt
-
25:
Information Security Governance Analysis Using Probabilistic Relational Models
Waldo Rocha Flores and Mathias Ekstedt
|
18:00 |
Welcome Drink (18:00 - 19:00) |