[TYPES/announce] Call for Participation: STM'14 (10-11 Sept, Wroclaw, Poland)
Hugo Jonker
hugo.jonker at uni.lu
Wed Aug 20 05:31:53 EDT 2014
(apologies if you receive multiple copies of this message)
CALL FOR PARTICIPATION
************************************************************
10th Workshop on Security and Trust Management (STM 2014)
In conjunction with ESORICS 2014
Wroclaw, Poland - 10-11 September 2014.
http://stm2014.uni.lu/
************************************************************
About the workshop
--------------------------------------------------
The 10th Workshop on Security and Trust Management will be held in
Wroclaw, Poland, on 10 and 11 September 2014. The goal of the
workshop is to promote progress and novel research on all theoretical
and practical aspects of security and trust in ICT by providing a
forum for researchers and practitioners coming from academia,
industry, and government.
In addition to 11 full papers and 6 short papers, the workshop features
an invited presentation by Javier Lopez, and the awarding cerermony of
the STM Best PhD Thesis award.
Registration
--------------------------------------------------
For online registration, please visit
http://stm14.uni.lu/registration.php
Accepted papers
--------------------------------------------------
- ALPS: An Action Language for Policy Specification and
Automated Safety Analysis.
Silvio Ranise and Riccardo Traverso.
- Using Prediction Markets to Hedge Information Security Risks.
Pankaj Pandey and Einar Snekkenes.
- Integrating Trust and Economic Theories with Knowledge Science
for Dependable Service Automation.
Vangalur Alagar and Kaiyu Wan.
- Monotonicity and Completeness in Attribute-based Access Control.
Jason Crampton and Charles Morisset.
- A Formal Model for Soft Enforcement: Influencing the Decision-Maker.
Charles Morisset, Iryna Yevseyeva, Thomas Gross and Aad Van Moorsel.
- BlueWallet: The Secure Bitcoin Wallet.
Tobias Bamert, Christian Decker, Roger Wattenhofer and Samuel Welten.
- A Formal Definition of Protocol Indistinguishability and
its Verification Using Maude-NPA.
Sonia Santiago, Santiago Escobar, Catherine Meadows and Jose Meseguer.
- Ensuring Secure Non-interference of Programs by Game Semantics.
Aleksandar S. Dimovski.
- Caching and Auditing in the RPPM Model.
Jason Crampton and James Sellwood.
- Privacy Architectures: Reasoning About Data Minimisation and
Integrity.
Thibaud Antignac and Daniel Le Métayer.
- Stateful Usage Control for Android Mobile Devices.
Aliaksandr Lazouski, Fabio Martinelli, Paolo Mori and Andrea Saracino.
- ROMEO: ReputatiOn Model Enhancing OpenID Simulator.
Ginés Dólera Tormo, Félix Gómez Mármol and Gregorio Martínez Pérez.
- NoPhish - An Anti-Phishing Education App.
Gamze Canova, Melanie Volkamer, Clemens Bergmann and Roland Borza.
- Evaluation of key management schemes in wireless sensor networks.
Filip Jurnecka, Martin Stehlík and Vashek Matyas.
- Efficient Java Code Generation of Security Protocols specified in
AnB/AnBx.
Paolo Modesti.
- Lime: Data Lineage in the Malicious Environment.
Michael Backes, Niklas Grimm and Aniket Kate.
- Hybrid Enforcement of Category-Based Access Control.
Asad Ali and Maribel Fernández.
--
Dr. Ir. Hugo Jonker
Faculty of Sciences, Technology and Communication
University of Luxembourg
6, rue Coudenhove-Kalergi
L-1359 Luxembourg
Luxembourg
tel: +352 466 644 5483
www: http://satoss.uni.lu/hugo/
More information about the Types-announce
mailing list