8:00
|
Welcome Desk /
Registration |
9:15
|
9:15 - 9:30
Opening
9:30 - 10:30 - Invited Talk
Ernesto Damiani
|
Room Baccarat II |
|
10:30
|
Coffe-break (10:30 - 11:00)
|
11:00
|
Session A1 - Authentication & Access Control |
11:00 - 11:30
Analysing the Woo-Lam protocol using CSP and rank functions
Siraj Shaikh and Vicky Bush
11:30 - 12:00
An Approach for the Analysis of Security Standards for Authentication in Distributed Systems
H. A. Eneh and O. Gemikonakli
|
Room Baccarat II |
Session B1 - Digital Signature & Certification |
11:00 - 11:30
MANET - Auto Configuration with Distributed Certification Authority models Considering Routing Protocols Usage
Robson de Oliveira Albuquerque, Maíra Hanashiro, Rafael Timoteo de Sousa Junior, Claudia J. B. Abbas and Luis Javier Garcia Villalba
|
Room Baccarat III |
|
13:00 |
Lunch (13:00 - 14:30)
|
14:30
|
Session A2 - Alerts & Intrusions management |
14:30 - 15:00
SisBrAV – Brazilian Vulnerability Alert System
Robson de Oliveira Albuquerque, Daniel Silva Almendra, Leonardo Lobo Pulcineli, Rafael Timoteo de Sousa Junior, Claudia J. B. Abbas and Luis Javier Garcia Villalba
15:00 - 15:30
Honeynet Clusters as an early Warning System for Production Networks
Sushan Sudaharan, Srikrishna Dhammalapati, Sijan Rai and Duminda Wijesekera
15:30 - 16:00
A Honeypot Implementation as Part of the Brazilian Distributed Honeypots Project and Statistical Analysis of Attacks Against a University’s Network
Claudia J. Barenco Abbas, Alessandra Lafetá, Giuliano Arruda and Luis Javier Garcia Villalba
16:00 - 16:30
A real-time intrusion prevention system for commercial enterprise databases and file systems
Ulf T. Mattsson
|
Room Baccarat II |
Session B2 - Key Management, Networks & Biometry |
14:30 - 15:00
Cooperative Defense against Network Attacks
Guangsen Zhang and Manish Parashar
15:00 - 15:30
A protocol for incorporating biometrics in 3G with respect to privacy
Christos K. Dimitriadis and Despina Polemi
|
Room Baccarat III |
|
16:30
|
Coffe-break (16:30 - 17:00)
|
17:00
|
Session A3 - Authorization, Delegation & Anonymity |
17:00 - 17:30
Tree Automata for Schema-level Filtering of XML Associations
Vaibhav Gowadia and Csilla Farkas
17:30 - 18:00
A Systematic Approach to Anonymity
Sabah S. Al-Fedaghi
|
Room Baccarat II |
Session B3 - DRM, Reputation & Information Clustering |
17:00 - 17:30
Controlled Sharing of Personal Content using Digital Rights Management
Claudine Conrado, Milan Petkovic, Michiel van der Veen and Wytse van der Velde
17:30 - 18:00
Using Reputation Systems to Cope with Trust Problems in Virtual Organizations
Marco Voss and Wolfram Wiesemann
18:00 - 18:30
External Object Trust Zone Mapping for Information Clustering
Yanjun Zuo and Brajendra Panda
|
Room Baccarat III |
|
19:00
|
Workshop Banquet (19:00 -
21:00) |