9:00 |
9:00 - 10:30
Session 4 - Security Requirements and
Patterns II |
- Towards a UML 2.0 Profile for RBAC
Modeling in Activity Diagrams
Alfonso Rodríguez, Eduardo Fernández-Medina and Mario
Piattini
- SECTET – An Extensible Framework for
the Realization of Secure Inter-Organizational Workflows
Michael Hafner, Ruth Breu, Berthold Agreiter and Andrea
Nowak
- Security Patterns Related to Security
Requirements
David G. Rosado, Carlos Gutiérrez, Eduardo
Fernández-Medina and Mario Piattini
- The Place and Role of Security
Patterns in Software Development Process
Oleksiy Mazhelis and Anton Naumenko
|
|
10:30
|
Coffee-break (10:30 - 11:00)
|
11:00 |
11:00 - 13:00
Session 5 - Cryptography and Multimedia
Systems |
- Names in Cryptographic Protocols
Simone Lupetti, Feike W. Dillema and Tage Stabell-Kulø
- Robust-audio-hash Synchronized Audio
Watermarking
Martin Steinebach, Sascha Zmdzinski and Sergey Neichtadt
- A New Method for Embedding Secret Data
to the Container Image Using ‘Chaotic’ Discrete Orthogonal
Transforms
Vladimir Chernov and Oleg Bespolitov
- Protecting Notification of Events in
Multimedia Systems
Eva Rodríguez, Silvia Llorente and Jaime Delgado
|
|
13:00
|
Lunch (13:00 - 14:30)
|
14:30
|
14:30 - 16:30
Session 6 - Authentication & Authorization |
- Analyzing Preauthentication Timestamps
To Crack Kerberos V Passwords
Ahmed Alazzawe, Anis Alazzawe, Asad Nawaz and Duminda
Wijesekera
- Grid Authorization Based on Existing
AAA Architectures
Manuel Sánchez, Gabriel López, Óscar Cánovas and Antonio
F. Gómez-Skarmeta
- A Distributed Kerberized Access
Architecture for Real Time Grids
A. Moralis, A. Lenis, M. Grammatikou, S. Papavassiliou
and B. Maglaris
|
|
16:30
|
Coffee-break (16:30 - 17:00)
|
17:00
|
17:00 - 18:30
Session 7 - Smart Cards Applications |
- A Secure Universal Loyalty Card
Sébastien Canard, Fabrice Clerc and Benjamin Morin
- The Software Infrastructure of a Java
Card Based Security Platform for Distributed Applications
Serge Chaumette, Achraf Karray and Damien Sauveron
- Secure Deployment of Applications to
Fielded Devices and Smart Cards
William G. Sirett, John A. MacDonald, Keith Mayes and
Konstantinos Markantonakis
|
|