Catalunya campus of Universitat Rovira i Virgili
Aula Magna Sala de Graus
08:00-09:00 Registration
09:00-09:15 Welcome address by the Rector of Universitat Rovira i Virgili, the Conference Honorary Chair and the General Chairs  
Keynote Talk

"On the Need for Collaborative Research: Rationales and Examples"
Marc Dacier (Symantec Research Labs)

10:15-10:45 Coffee Break
10:45-11:30 "Challenges of Web Application Security"
Vio Onut (IBM CAS Research / University of Ottawa)
  • # "Inter-Trust motivation, requirements and user scenarios" J. Puiggalí and A. Skarmeta
  • # "Privacy and security in the Inter-Trust policy negotiation model and use cases" O. Farràs
  • # "Inter-Trust framework for security policy interoperability" N. and F. Cuppens
11:30-12:15 "Anatomy of a Privacy Code Review"
Carmen Ruiz-Vicente (Google Inc.)
12:15-14:00 Lunch
Privacy I
"Social networks and social media"
  • #3 "Coalitional Games for the Management of Anonymous Access in Online Social Networks" E. Palomar, A. Alcaide, E. Molina and Y. Zhang
  • #50 "Allowing Privacy-Preserving Analysis of Social Network Likes" F. Buccafurri, L. Fotia and G. Lax
  • #129 "Aegis: A Semantic Implementation of Privacy as Contextual Integrity in Social Ecosystems" I. Kayes and A. Iamnitchi
  • #145 "How People Care about Their Personal Data Released on Social Media" K. dos Santos Brito, F. Araujo Durao, V. Cardoso Garcia and S. Romero de Lemos Meira
Trust I
"Trust and Crowds"
  • #13 "Extended Structural Balance Theory for Modeling Trust in Social Networks" Y. Qian and S. Adali
  • #47 "TrustForge: Flexible Access Control for Collaborative Crowd-Sourced Environment" J. Chang, P. Gebhard, A. Haeberlen, Z. Ives, I. Lee, O. Sokolsky and K. K. Venkatasubramanian
  • #87 "Semi-Automated Assessment of Annotation Trustworthiness" D. Ceolin, A. Nottamkandath and W. Fokkink
  • #144 "Leveraging Platoon Dispersion for Sybil Detection in Vehicular Networks" M. Al Mutaz, L. Malott and S. Chellappan
16:00-16:30 Coffee Break
Privacy II
"Cryptographic protocols"
  • #17 "Key Privacy and Anonymous Protocols" P. D'Arco and A. De Santis
  • #89 "Traceability Analysis of Quadratic Residue-Based RFID Authentication Protocols" Z. Sohrabi-Bonab, M. R. Alagheband and M. Reza Aref
  • #131 "Pseudonymous Communications in Secure Industrial Wireless Sensor Networks" N. Oualha
Security I
"Access control"
  • #106 "Policy templates for relationship-based access control" E. Aktoudianakis, J. Crampton, S. Schneider, H. Treharne and A. Waller
  • #36 "Model-based Specification and Refinement of Usage Control Policies" R. Neisse and J. Doerr
  • #126 "A Provenance-based Access Control Model for Dynamic Separation of Duties" D. Nguyen, J. Park and R. Sandhu
19:00 Roman Tarragona tour (Meeting point)


  Catalunya campus of Universitat Rovira i Virgili
Aula Magna Sala de Graus
08:45-09:00 Registration
Keynote talk

"Digital Identity Protection - Concepts and Issues"
Elisa Bertino (Purdue University, USA)

10:00-10:30 Coffee break
Privacy III
"Privacy preserving/enhancing technologies"
  • #35 "Differential Privacy via t-Closeness in Data Publishing" J. Soria-Comas and J. Domingo-Ferrer
  • #68 "Blend me in: Privacy-Preserving Input Generalization for Personalized Online Services" A. Baquero, A. Schiffman and J. Shrager
  • #147 "Identifying Individual Vulnerability Based on Public Data" J. Ferro, L. Singh and M. Sherr
  • #149 "HALT: Hybrid Anonymization of Longitudinal Transactions" M. Sehatkar and S. Matwin
Security II
"Intrusion detection I"
  • #61 "Targeted Attacks Detection With SPuNge" M. Balduzzi, V. Ciangaglini and R. McArdle
  • #80 "Voice Calls for Free: How the Black Market Establishes Free Phone Calls -- Trapped and Uncovered by a VoIP Honeynet" M. Gruber, C. Schanes, F. Fankhauser and T. Grechenig
  • #95 "The Role of Phone Numbers in Understanding Cyber-Crime Schemes" A. Costin, J. Isacenkova, M. Balduzzi, A. Francillon and D. Balzarotti
  • #125 "Error-Rate-based Fusion of Biometric Experts" M. Ingwar, N. Ahmed and C. D. Jensen
12:30-14:00 Lunch
Privacy IV
"Privacy and location-based technologies and services"
  • #21 "Selective Cloaking: Need-to-know for Location-based Apps" B. Henne, C. Kater, M. Smith and M. Brenner
  • #96 "Privacy-preserving Social Recommendations in Geosocial Networks" B. Liu and U. Hengartner
  • #55 "A Self-Adaptive Classification for the Dissociating Privacy Agent" M. Juarez and V. Torra
  • #134 "A Peer-to-Peer Agent Community for Digital Oblivion in Online Social Networks" K. Stokes and N. Carlsson
Security III
"Intrusion detection II"
  • #15 "An NFC Based Consumer-Level Counterfeit Detection Framework" M. Qasim-Saeed, Z. Bilal and C. Walter
  • #140 "Writing down your password: Does it help?" V. Boothroyd and S. Chiasson
  • #75 "Contextual Feature Based One-Class Classifier Approach for Detecting Video Response Spam on YouTube" V. Chaudhary and A. Sureka
  • #31 "An Efficient and Provably-Secure Coercion-Resistant E-Voting Protocol" A. Toroghi Haghighat, M. Sadeq Dousti and R. Jalili
16:00-16:30 Coffee Break
Privacy V
"Short Papers"
  • #99 "Top-down Itemset Recoding for Releasing Private Complex Data" T. Takahashi, K. Sobataka, T. Takenouchi, Y. Toyoda, T. Mori and T. Kohro
  • #54 "Providing Useful and Private Web Search by Means of Social Network Profiling" A. Viejo and D. Sánchez
  • #141 "An implementation of secure multi-party computations to preserve privacy when processing EMR data" A. Andersen
  • #60 "Define Privacy-Preserving Setbase Drawer Size Standard: A ε-closeness Perspective" B. Justus, F. Cuppens, N. Cuppens-Boulahia, J. Bringer, H. Chabanne and O. Cipiere
Security IV
"Short Papers"
  • #19 "Improving Security of Virtual Machines during Live Migrations" S. Biedermann, M. Zittel and S. Katzenbeisser
  • #94 "Real-time Malicious Fast-flux Detection Using DNS and Bot Related Features" S. Martinez-Bea, S. Castillo-Perez and J. Garcia-Alfaro
Trust II
"Short Papers"
  • #9 "Towards Engineering Trust Systems: Template-Based, Component-Oriented Assembly" S. Magin and S. Hauke
  • #66 "Encouraging Second Thoughts: Obstructive User Interfaces for Raising Security Awareness" T. Storer, S. Marsh, S. Noël, B. Esfandiari, K. El-Khatib, P. Briggs, K. Renaud and M. Vefa-Bicakci.
  • #110 "Device Comfort for Mobile Heatlh Information Accessibility" S. Marsh, Y. Wang, S. Noël, L. Robart, J. Stewart
20:00 Gala Dinner (Meeting point)


  Catalunya campus of Universitat Rovira i Virgili
Aula Magna Sala de Graus
Privacy VI
"Cloud computing"
  • #103 "A novel privacy preserving keyword searching for cloud storage" L. Cheng, Q. Wen, Z. Jin and H. Zhang
  • #111 "Secure Rendering Process in Cloud Computing" M. Rizuan Baharon, Q. Shi, D. Llewellyn-Jones and M. Merabti
Security V
"Cloud Computing"
  • #120 "A Multi-Tenant RBAC Model for Collaborative Cloud Services" B. Tang, Q. Li and R. Sandhu
  • #49 "Design and Implementation of Multi-user Secure Indices for Encrypted Cloud Storage" M. Lin, W. Hong, C. Chen and C. Cheng
10:00-10:30 Coffee break
Trust III
"Trust and Platforms"
  • #48 "Efficient Polynomial Delegation Under Standard Assumptions" P. Morillo and M. Obrador
  • #67 "Socio-Technical Formal Analysis of TLS Certificate Validation in Modern Browsers" G. Bella, R. Giustolisi and G. Lenzini
  • #85 "Trust-based Decision-making for the Adaptation of Public Displays in Changing Social Contexts" E. Kurdjokova, M. Wißner, S. Hammer and E. André
  • #97 "Communicating Trustworthiness using Radar Graphs: A Detailed Look" J. Nurse, I. Agrafiotis, S. Creese, M. Goldsmith and K. Lamberts
Security VI
  • #18 "Hot-Patching a Web Server: a Case Study of ASAP Code Repair" M. Payer and T. Gross
  • #25 "SPIKE: A Novel Session Key Management Protocol with Time-Varying Secure Cluster Formation in Wireless Sensor Networks" S. Sanyal
  • #128 "Multi-data-types Interval Decision Diagrams for XACML Evaluation Engine" C. Ngo, M. Makkes, Y. Demchenko and C. de Laat
  • #146 "SSAS: A Simple Secure Addressing Scheme for IPv6 Autoconfiguration" H. Rafiee and C. Meinel
12:30-13:00 Conclusions and farewell  
13:00-14:00 Lunch