Preliminary Program


LAST UPDATED: 20.07.2015

 

 

 

 

Tuesday, 21 July 2015

 

8:00-

 

 

Conference On-Site Registration

 

8:45-9:00

 

 

Welcome Speeches

 

 

 

 

 

Dr. Ali Ghorbani

Dr. Ahmet Koltuksuz

 

9:00-10:00

 

 

Invited Talk: Qualitative Studies in Mobile Privacy

 

 

 

 

 

Dr. Bashar Nuseibeh, The Open University (UK) and Lero (Ireland)

Chair: Hüseyin Hışıl

 

 

10:00-10:30

 

 

Morning Break

 

 

 

 

 

PRIVACY 1: PRIVACY MANAGEMENT TECHNIQUES AND POLICIES

Chair: Ali Ghorbani

 

 

 

 

 

Quantifying Risk of identification in Mathematical Model of an Anonymized Dataset

 

 

 

 

 

Hiroaki Kikuchi and Katsumi Takahashi

 

 

 

 

 

Who Manages the Manager? Identity Management and User Ownership in the Age of Data

 

10:30-12:10

 

 

Jonas Breuer, Heritiana Ranaivoson, Uschi Buchinger and Pieter Ballon

 

 

(4 x 25 min.)

 

InnerCircle: A Parallelizable Decentralized Privacy-Preserving Location Proximity Protocol

 

 

 

 

 

Per Hallgren, Martín Ochoa and Andrei Sabelfeld

 

 

 

 

 

Is Privacy a Human Right? An Empirical Examination in a Global Context

 

 

 

 

 

Hsiao-Ying Huang and Masooda Bashir

 

 

12:10-13:30

 

 

Lunch Break

 

 

 

 

 

PRIVACY 2: PRIVACY PRESERVING/ENHANCING TECHNOLOGIES

Chair: Bashar Nuseibeh

 

 

 

 

 

Disclosure Risk Assessment via Record Linkage by a Maximum-Knowledge Attacker

 

 

 

 

 

Josep Domingo-Ferrer, Sara Ricci and Jordi Soria-Comas

 

 

 

 

 

Privacy Preserving Business Process Matching

 

13:30-15:10

 

 

Dilian Gurov, Peeter Laud and Roberto Guanciale

 

 

(4 x 25 min.)

 

Privacy-Preserving Conditional Random Selection

 

 

 

 

 

Stefan Wueller, Fabian Foerg, Susanne Wetzel and Ulrike Meyer

 

 

 

 

 

Pseudorandom number Sampling for Computational Differential Privacy

 

 

 

 

 

Balamurugan Anandan and Chris Clifton

 

 

15:10-15:45

 

 

Afternoon Break

 

 

 

 

 

SECURITY 1: SOCIAL NETWORKS AND WEB SECURITY

Chair: Ahmet Koltuksuz

 

 

 

 

 

Towards Automatic Real Time Identification of Malicious Posts on Facebook

 

 

 

 

 

Prateek Dewan and Ponnurangam Kumaraguru

 

15:45 -17:00

 

 

Revealing the Relationship Network Behind Link Spam

 

 

 

Apostolis Zarras, Antonis Papadogiannakis, Sotiris Ioannidis and Thorsten Holz

 

 

(3 x 25 min.)

 

 

 

 

 

 

What They Do in Shadows: Twitter Underground Follower Market

 

 

 

 

 

 

 

 

 

 

Anupama Aggarwal and Ponnurangam Kumaraguru

 

 

18:00-19:30

 

 

Welcome Cocktail

 

 

 

 

 

Wednesday, 22 July 2015

 

 

 

 

 

TRUST

Chair: Masooda Bashir

 

 

 

 

 

A Model for Calculating User-Identity Trustworthiness in Online Transactions

 

 

 

 

 

Brian Soeder and K. Suzanne Barber

 

9:00-10:15

 

 

Physical Trust-based Persistent Authentication

 

 

 

Masahiro Fujita, Shiori Arimura, Yuki Ikeya, Christian Damsgaard Jensen and

 

 

(3 x 25 min.)

 

 

 

 

Masakatsu Nishigaki

 

 

 

 

 

 

 

 

 

 

Minimizing Transitive Trust Threats in Software Management Systems

 

 

 

 

 

Jaap Boender, Giuseppe Primiero and Franco Raimondi

 

10:15-10:20

 

 

IEEE Informative Talk

 

 

 

 

 

 

 

11:00-19:30

 

 

Social Tour: Trip to Ephesus and Şirince (Free of Charge)

 

 

 

 

 

 

 

21:00

 

 

Banquet

 

 

 

 

 

Thursday, 23 July 2015

 

9:00-10:00

 

 

Invited Talk: Secure Data Deduplication in Cloud Environments

 

 

 

 

 

Dr. Ali Miri, Ryerson University (Canada)

Chair: Ahmet Koltuksuz

 

 

10:00-10:30

 

 

Morning Break

 

 

 

 

 

SECURITY 2: ACCESS CONTROL AND MODELLING

Chair: Ali Miri

 

 

 

 

 

A Secure Revocable Personal Health Record System With Policy-Based Fine-Grained

 

 

 

 

 

Access Control

 

 

 

 

 

Mitu Kumar Debnath, Saeed Samet and Krishnamurthy Vidyasankar

 

10:30-12:10

 

 

An Efficient ID-Based Message Recoverable Privacy-Preserving Auditing Scheme

 

 

 

Mehmet Sabir Kiraz, İsa Sertkaya and Osmanbey Uzunkol

 

 

(4 x 25 min.)

 

 

 

 

An Access Control Model for Protecting Provenance Graphs

 

 

 

 

 

 

 

 

 

 

Liang Chen, Peter Edwards, John Nelson and Timothy Norman

 

 

 

 

 

ECA rules for controlling authorisation plan to satisfy dynamic constraints

 

 

 

 

 

Meriam Jemel, Nadia Ben Azzouna and Khaled Ghedira

 

 

12:10-13:30

 

 

Lunch Break

 

 

 

 

 

PRIVACY 3: PRIVACY PRESERVING DATA MINING

Chair: Mutlu Beyazıt

 

 

 

 

 

A Framework for a Privacy-aware Feature Selection Evaluation Measure

 

 

 

 

 

Yasser Jafer, Stan Matwin and Marina Sokolova

 

13:30-14:45

 

 

An Adaptive Algorithm for Multivariate Data-Oriented Microaggregation

 

 

(3 x 25 min.)

 

 

Balkis Abidi and Sadok Ben Yahia

 

 

 

 

 

Recommendation of categories in an agents world: The role of (not) local

 

 

 

 

 

communicative environments

 

 

 

 

 

Rino Falcone, Alessandro Sapienza and Cristiano Castelfranchi

 

 

14:45-15:00

 

 

Afternoon Break

 

 

 

 

 

SECURITY 3: EMBEDDED AND CONSTRAINED DEVICES

Chair: Hüseyin Hışıl

 

 

 

 

 

Devil in a Box: Installing Backdoors in Electronic Door Locks

 

 

 

 

 

Seongyeol Oh, Joon-Sung Yang, Andrea Bianchi and Hyoungshick Kim

 

15:00 -16:15

 

 

Embedded Systems Security: Threats, Vulnerabilities, and Attack Taxonomy

 

 

 

Dorottya Papp, Zhendong Ma and Levente Buttyan

 

 

(3 x 25 min.)

 

 

 

 

 

 

Performance evaluation of ECC scalar multiplication using parallel modular algorithms

 

 

 

 

 

 

 

 

 

 

on mobile devices

 

 

 

 

 

Tiago Vanderlei de Arruda, Yeda Regina Venturini and Tiemi Christine Sakata

 

 

16:15-16:30

 

 

Afternoon Break

 

 

 

 

 

SECURITY 4: VULNERABILITY DETECTION

Chair: İbrahim Zincir

 

 

 

 

 

Real-Time Signature-Based Detection Approach for SMS Bonnet

 

 

 

 

 

Abdullah Alzahrani and Ali Ghorbani

 

16:30-17:45

 

 

Visualising Network Security through Arguments

 

 

 

Fabio Martinelli, Francesco Santini and Artsiom Yautsiukhin

 

 

(3 x 25 min.)

 

 

 

 

 

 

Keyboard or Keylogger?: an empirical security analysis of third-party keyboards on

 

 

 

 

 

 

 

 

 

 

Android

 

 

 

 

 

Junsung Cho, Geumhwan Cho and Hyoungshick Kim