CALL FOR PARTICIPATION
**********************************************************************
9th International Conference on Risks and Security of Internet
and Systems
(CRiSIS 2014)
University of Trento, Department of Sociology and Social Research
via Verdi 26, Trento, Italy
August 27th-29th, 2014
http://titan.disi.unitn.it/crisis2014/
**********************************************************************
ABOUT THE CONFERENCE
The International Conference on Risks and Security of Internet and
Systems 2014 is the ninth in a series dedicated to security challenges
related to Internet applications, networks and systems. In recent years,
the Internet has become essential for the exchange of information
between user groups and organisations from different backgrounds and
with different needs and objectives. These users are exposed to
increasing security and privacy risks, due to the development of
sophisticated on-line attacks, the growth of cyber-crime. In this
context, new security mechanisms and techniques are needed to achieve an
acceptable level of assurance for critical domains such as
transportation, health, defence, banking, critical infrastructures. The
CRiSIS conference offers an effective forum for computer and network
security researchers from industry, academia and government to meet,
exchange ideas and present recent advances on Internet-related security
threats and vulnerabilities, and o!
n the solutions that are needed to counter them.
The conference will be a 3-days event featuring technical presentations
of 20 papers an invited talk and 3 technical tutorials.
REGISTRATION
Registration and accommodation information is available at
http://titan.disi.unitn.it/crisis2014
Early registration ends on August 15th!
PRELIMINARY PROGRAM
_____________________________________________________________________________
Wednesday, August 27th 2014
----------------------
09:30 - 10:00 Registration
10:00 - 12:00 Tutorial: Online Privacy: Risks, Challenges, and New Trends
(Esma Aïmeur)
12:00 - 13:00 Lunch
13:00 - 15:00 Tutorial: Data Anonymization
(Josep Domingo-Ferrer & Jordi Soria Comas)
15:00 - 15:30 Break
15:30 - 17:30 Tutorial: Security of the Android Operating Systems
(Yury Zhauniarovich)
17:30 Social Event to Buonconsiglio Castle
_____________________________________________________________________________
Thursday, August 28th 2014
------------------------
9:15 – 9:30 Opening Remarks / Registration
9:30 – 10:30 Invited Keynote Talk
10: 30 – 11:00 Break
11:00 – 12:30, Session 1 – Anomalies
11:00 – 11:30 Detecting Anomalies in Printed Intelligence Factory Network
(Matti Mantere, Mirko Sailio and Sami Noponen)
11:30 – 12:00 Context-Awareness using Anomaly-based Detectors for Smart
Grid Domains
(Cristina Alcaraz, Lorena Cazorla and Gerardo Fernandez)
12:00 – 12:30 Automated detection of logical errors in programs
(George Stergiopoulos, Panagiotis Katsaros and Dimitris Gritzalis)
12:30 – 14:00 Lunch
14:00 – 15:00, Session 2 – Security Technology
14:00 – 14:30 Reversible Fragile Algorithm for Watermarking Relational
Database Based on Multilevel Histogram Modification
(Amal Hamdy, Mohamed Hashem, Amal El-Shershaby and Sawsan Shouman)
14:30 – 15:00 Evaluation of Dynamic Instantiation in CPRM-based Systems
(Ana Nieto)
15:00 – 15:30 Break
15:30 – 16:30, Session 3 – Short Papers
15:30 – 15:50 Towards a Full Support of Obligations In XACML
(Donia Elkateb, Tejeddine Mouelhi, Yves Le Traon, Yehia ElRakaiby
and Iram Rubab)
15:50 – 16:10 Managing Heterogeneous Access Control Models
Cross-Organization
(Samira Haguouche and Zahi Jarir)
16:10 – 16:30 ISER: a platform for security interoperability of
multi-source systems
(Khalifa Toumi, Fabian Autrel, Ana Cavalli and Sammy Haddad)
17:00 Social Event: Visit to Garda Lake
20:00 Social Dinner: Toblino Castle
_____________________________________________________________________________
Friday, August 29th 2014
------------------------
9:00 – 10:30, Session 4 - Privacy
9:00 – 9:30 Privacy Issues In Geosocial Networks
(Zakaria Shahnoune, Cheu Yien Yep and Esma Aïmeur)
9:30 – 10:00 SocialSpy: Browsing (Supposedly) Hidden Information in
Online Social Networks
(Giuseppe Cascavilla, Andrea Burratin and Mauro Conti)
10:00 – 10:30 Latent Semantic Analysis for Privacy Preserving Peer Feedback
(Mouna Selmi, Hicham Hage and Esma Aïmeur)
10:30 – 11:00 Break
11:00 – 12:30, Session 5 – Access control, policies, software
11:00 – 11:30 Attacking Suggest Boxes in Web Applications Over HTTPS
Using Stochastic Side-Channel Algorithms
(Alexander Schaub, Emmanuel Schneider, Alexandros Hollender,
Vinicius Calasans,
Laurent Jolie, Robin Touillon, Annelie Heuser, Sylvain Guilley and
Olivier Rioul)
11:30 – 12:00 Location-aware RBAC based on Spatial Feature Models and
Realistic Positioning
(Philipp Marcus, Lorenz Schauer and Claudia Linnhoff-Popien_
12:00 – 12:30 Inter-Technology Conflict Analysis for Communication
Protection Policies
(Fulvio Valenza, Cataldo Basile, Daniele Canavese and Antonio Lioy)
12:30 – 14:00 Lunch
14:00 – 15:30, Session 6 - Attacks
14:00 – 14:30 Two-Level Automated Approach for Defending Against
Obfuscated Zero-day Attacks
(Ratinder Kaur and Maninder Singh)
14:30 – 15:00 Practical Attacks on Virtual Worlds
(Graham Hili, Sheila Cobourne, Keith Mayes and Konstantinos
Markantonakis)
15:00 – 15:30 TabsGuard: A Hybrid Approach to Detect and Prevent
Tabnabbing Attacks
(Hana Fahim Hashemi, Mohammad Zulkernine and Komminist Weldemariam)
15:30 – 16:00 Break
16:00 – 17:00, Session 7 – Short Papers
16:00 – 16:20 Key Extraction Attack using Statical Analysis of Memory
Dump Data
(Yuto Nakano, Anirban Basu, Shinsaku Kiyomoto and Yutaka Miyake)
16:20 – 16:40 How Robust is the Internet? – Insights from Graph Analysis
(Annika Baumann and Benjamin Fabian)
16:40 – 17:00 Regularity Based Decentralized Social Networks
(Zhe Wang and Naftaly Minsky)
MORE INFORMATION
Additional information about the conference can be found at
http://titan.disi.unitn.it/crisis2014/
For information regarding the conference you may contact:
crisis2014@unitn.it
**********************************************************
*
* Contributions to be spread via DMANET are submitted to
*
* DMANET@zpr.uni-koeln.de
*
* Replies to a message carried on DMANET should NOT be
* addressed to DMANET but to the original sender. The
* original sender, however, is invited to prepare an
* update of the replies received and to communicate it
* via DMANET.
*
* DISCRETE MATHEMATICS AND ALGORITHMS NETWORK (DMANET)
* http://www.zaik.uni-koeln.de/AFS/publications/dmanet/
*
**********************************************************