8:30 |
8:30 - 10:45 - Room
Estrela do Mar
Session 4 - Security Engineering |
-
Obtaining Use Cases and Security Use
Cases from Secure Business Process through the MDA Approach
Alfonso Rodríguez and Ignacio García-Rodríguez de Guzmán
-
SREPPLine: Towards a Security
Requirements Engineering Process for Software Product Lines
Daniel Mellado, Eduardo Fernández-Medina and Mario
Piattini
-
MMISS-SME Practical Development:
Maturity Model for Information Systems Security Management
in SMEs
Luis Enrique Sánchez, Daniel Villafranca and Mario
Piattini
-
SECRDW: An Extension of the Relational
Package from CWM for Representing Secure Data Warehouses at
the Logical Level
Emilio Soler, Juan Trujillo, Eduardo Fernández-Medina and
Mario Piattini
|
|
10:45
|
Coffee-break (10:45 - 11:00)
|
11:00 |
11:00 - 13:00 - Room
Estrela do Mar
Session 5 - Security Services II |
-
A Reputation System for Electronic
Negotiations
Omid Tafreschi, Dominique Maehler, Janina Fengel,
Michael Rebstock and Claudia Eckert
-
A Fair Non-repudiation Service in a
Web Services Peer-to-Peer Environment
Berthold Agreiter, Michael Hafner and Ruth Breu
-
Research on Counter Http DDoS Attacks
based on Weighted Queue Random Early Drop
Guo Rui, Chang Guiran, Hou Ruidong, Baojing Sun, Liu An
and
Bencheng Zhang
-
Comparison of IPsec to TLS and SRTP
for Securing VoIP
Barry Sweeney and Duminda Wijesekera
|
|
13:00
|
Lunch (13:00 - 14:00)
|
14:00
|
14:00 - 15:30 - Room
Estrela do Mar
Session 6 - Security Services III (Short
Papers) |
-
Security in TciNMP Systems
Katalin Anna Lázár and Csilla Farkas
-
Confining the Insider Threat in Mass
Virtual Hosting Systems
Marco Prandini, Eugenio Faldella and Roberto Laschi
-
A General Approach to Securely Querying XML
Ernesto Damiani, Majirus Fansi, Alban Gabillon and
Stefania Marrara
-
New Primitives to AOP Weaving Capabilities for Security
Hardening Concerns
Azzam Mourad, Marc-André Laverdičre and Mourad Debbabi
|
|
15:30
|
15:30 - 16:00 - Room
Estrela do Mar
Closing Session |
|