09:00 Welcome Desk & Registration (09:00 - 09:30)
09:40
09:30 - 09:45 - Room 303E Opening Session
09:45
09:45 - 10:45 - Room 303E Keynote Speaker: (To be confirmed)
10:45 Coffee-Break (10:45 - 11:00)
11:00
11:00 - 13:00 - Room 303E Parallel Session 1
  • 2: A New Enterprise Security Pattern: Secure Software as a Service (SaaS) Santiago Moral-Garcia, Santiago Moral-Rubio, Eduardo B. Fernández and Eduardo Fernández-Medina
  • 1: Public Policy and Regulatory Implications for the Implementation of Opportunistic Cloud Computing Services for Enterprises Eric Kuada, Henning Olesen and Anders Henten
  • 17: Security Criteria in Deciding on Migration of Systems to the Cloud Rafael Gómez, David G. Rosado, Daniel Mellado and Eduardo Fernández-Medina
  • 5: Free Web-based Personal Health Records: An Assessment of Security and Privacy Inma Carrión, José-Luis Fernández-Alemán and Ambrosio Toval
  • 22: A Systematic Review of Methodologies and Models for the Analysis and Management of Associative and Hierarchical Risk in SMEs Antonio Santos-Olmo, Luis Enrique Sánchez, Eduardo Fernández-Medina and Mario Piattini
  • 12: Ontology and Fuzzy Measures based System for Information Security Risk Assessment Raihan Muratkhan, Dauren Kabenov and Dina Satybaldina
13:00 Lunch (13:00 - 14:15)
14:15
14:15 - 16:30 - Room 303E Parallel Session 2
  • 20: Eliciting Security Requirements for Business Processes using Patterns Naved Ahmed, Raimundas Matulevičius and Naiad Hossain Khan
  • 9: Towards the Extension of Secure Tropos Language to Support Software Product Lines Development Daniel Mellado and Haralambos Mouratidis
  • 13: Zero-knowledge Authentication for Self-managed Vehicular Networks C. Caballero-Gil, P. Caballero-Gil and J. Molina-Gil
  • 16: A Sensitivity Analysis of Common Operating Systems to ROP Attacks Marco Prandini and Marco Ramilli
  • 4: Spamming Botnet Detection using Neural Networks Ickin Vural and Hein Venter
16:30 Coffee-Break (16:30 - 16:45)
16:45
16:45 - 17:30 - Room 303E Parallel Session 3
  • 19: Mining Windows Registry for Data Exfiltration Detection Yi Hu, Rubaiyat Hossain, Papa Seye and Sri Vasireddy
  • 21: A Grouping Model for Prompt Agent based Damage Assessment Naveen Ramanathan, Brajendra Panda and Yi Hu
17:30
17:30 - 17:45 - Room 303E Closing Session