| 8:00 | Welcome Desk / 
          Registration | 
       
        
      | 9:15 | 
             
              | 9:15 - 9:30Opening
 
 9:30 - 10:30 - Invited Talk
 Ernesto Damiani
 | Room Baccarat II |  | 
       
        | 10:30 | Coffe-break (10:30 - 11:00) | 
       
        | 11:00 | 
                
              
            | Session A1 - Authentication & Access Control |   
              | 11:00 - 11:30 
                Analysing the Woo-Lam protocol using CSP and rank functions
 Siraj Shaikh and Vicky Bush
 
 11:30 - 12:00
 An Approach for the Analysis of Security Standards for Authentication in Distributed Systems
 H. A. Eneh and O. Gemikonakli
 | Room Baccarat II |   
              
            | Session B1 - Digital Signature & Certification |   
              | 11:00 - 11:30 
                MANET - Auto Configuration with Distributed Certification Authority models Considering Routing Protocols Usage
 Robson de Oliveira Albuquerque, Maíra Hanashiro, Rafael Timoteo de Sousa Junior, Claudia J. B. Abbas and Luis Javier Garcia Villalba
 | Room Baccarat III |  | 
       
        | 13:00 | Lunch (13:00 - 14:30) | 
	   
        
      | 14:30 | 
                
              
            | Session A2 - Alerts & Intrusions management |   
              | 14:30 - 15:00 
                SisBrAV – Brazilian Vulnerability Alert System
 Robson de Oliveira Albuquerque, Daniel Silva Almendra, Leonardo Lobo Pulcineli, Rafael Timoteo de Sousa Junior, Claudia J. B. Abbas and Luis Javier Garcia Villalba
 
 15:00 - 15:30
 Honeynet Clusters as an early Warning System for Production Networks
 Sushan Sudaharan, Srikrishna Dhammalapati, Sijan Rai and Duminda Wijesekera
 
 15:30 - 16:00
 A Honeypot Implementation as Part of the Brazilian Distributed Honeypots Project and Statistical Analysis of Attacks Against a University’s Network
 Claudia J. Barenco Abbas, Alessandra Lafetá, Giuliano Arruda and Luis Javier Garcia Villalba
 
 16:00 - 16:30
 A real-time intrusion prevention system for commercial enterprise databases and file systems
 Ulf T. Mattsson
 | Room Baccarat II |   
              
            | Session B2 - Key Management, Networks & Biometry |   
              | 14:30 - 15:00 
                Cooperative Defense against Network Attacks
 Guangsen Zhang and Manish Parashar
 
 15:00 - 15:30
 A protocol for incorporating biometrics in 3G with respect to privacy
 Christos K. Dimitriadis and Despina Polemi
 | Room Baccarat III |  | 
	   
        | 16:30 | Coffe-break (16:30 - 17:00) | 
	   
        
      | 17:00 | 
                
              
            | Session A3 - Authorization, Delegation & Anonymity |   
              |  17:00 - 17:30Tree Automata for Schema-level Filtering of XML Associations
 Vaibhav Gowadia and Csilla Farkas
 
 17:30 - 18:00
 A Systematic Approach to Anonymity
 Sabah S. Al-Fedaghi
 | Room Baccarat II |   
              
            | Session B3 - DRM, Reputation & Information Clustering |   
              |  17:00 - 17:30Controlled Sharing of Personal Content using Digital Rights Management
 Claudine Conrado, Milan Petkovic, Michiel van der Veen and Wytse van der Velde
 
 17:30 - 18:00
 Using Reputation Systems to Cope with Trust Problems in Virtual Organizations
 Marco Voss and Wolfram Wiesemann
 
 18:00 - 18:30
 External Object Trust Zone Mapping for Information Clustering
 Yanjun Zuo and Brajendra Panda
 | Room Baccarat III |  | 
       
        | 19:00 | Workshop Banquet (19:00 - 
          21:00) |