[Apologies if you receive multiple copies of this message]
REGISTRATION INFORMATION AT: http://www.esorics06.tu-harburg.de/registration.html
*********************************************************************** ****PROGRAM**** 2ND INTERNATIONAL WORKSHOP ON SECURITY AND TRUST MANAGEMENT (STM'06) Hamburg,Germany - September 20, 2006 (in conjunction with ESORICS 2006) http://www.hec.unil.ch/STM06/
***********************************************************************
Wednesday, 20/9
9:00 - 9:10 Intro by the chairs 9:10 - 10:10 Invited speaker "Addressing Security and Trust Requirements in WSN" Javier Lopez - University of Malaga
10:10 - 10:40 Coffee break 10:40 - 12:10 SESSION 1: FRAMEWORKS AND SYSTEMS
"The MoR-Trust distributed trust management system: Design and simulation results" by Stephanos Androutsellis-Theotokis, Diomidis Spinellis and Vasileios Vlachos.
"A Scalable Evidence Based Self-Managing Framework for Trust Management" by Mohammad Waseem Hassan, Richard McClatchey and Ian Willers
"Managing Trustworthiness in Component-based Embedded Systems" by Gabriele Lenzini, Andrew Tokmakoff and Johan Muskens
12:10 - 13:45 LUNCH
13:45 - 15:15 SESSION 2: SECURITY & TRUST IN IT
"Security and Trust in IT Business Outsourcing: a Manifesto" by Artsiom Yautsiukhin, Fabio Massacci, Yuecel Karabulut, Florian Kerschbaum and Philip Robinson
"Secure Information Sharing in a Virtual Multi-Agency Team Environment" by Nabil Adam, Ahmet Kozanoglu, Aabhas Paliwal and Basit Shafiq
"Building Reputations for Internet Clients" by Songjie Wei and Jelena Mirkovic
15:15 - 15:45 Break 15:45 - 16:45 SESSION 3: TRUST and PRIVACY
"A Survey on Trust and Privacy Negotiability in the Norwegian Mobile Telecom Market" by Stig F. Mjølsnes and Marius Teigen
"Trust Mass, Volume and Density - a Novel Approach to Reasoning about Trust" by Fredrik Degerlund.
Thursday, 21/9
09:00 - 10:00 Invited speaker "Distributed Usage Control" by Alexander Pretschner - ETH Zurich
10:00 - 10:30 SESSION 4: SECURITY
"Through modeling to synthesis of security automata" by Fabio Martinelli and Ilaria Matteucci
10:30 - 11:00 Break
11:00 - 12:30 SESSION 5: THEORY
"Towards the construction of Attack Resistant and Efficient Overlay Streaming Topologies" by Thorsten Strufe, Jens Wildhagen and Guenter Schaefer
"Towards Trustworthy Spatial Messaging" by Michel Deriaz and Jean-Marc Seigneur
"Partial and fuzzy constraint satisfaction to support coalition formation" by Petros Belsis, Stefanos Gritzalis and Sokratis K. Katsikas
GENERAL CHAIRS Solange Ghernaouti Hélie Univ. Lausanne, CH email: sgh@unil.ch
Ulrich Ultes-Nitsche Univ. Fribourg, CH email: uun@unifr.ch
PROGRAM CO-CHAIRS Sandro Etalle University of Twente, NL email: sandro.etalle@utwente.nl
Pierangela Samarati Universita' di Milano - Italy email: samarati@dti.unimi.it
PUBLICATION CHAIR Sara Foresti Universita' di Milano - Italy email: foresti@dti.unimi.it
PUBLICITY CHAIR Claudio A. Ardagna Universita' di Milano - Italy email: ardagna@dti.unimi.it
PROGRAM COMMITTEE: Viajy Atluri, Rutgers Univ., USA Joris Claessens, Microsoft EMIC, DE Sabrina De Capitani di Vimercati, Univ. Milano, IT Theo Dimitrakos, British Telecom, UK Mara Isabel González Vasco, Univ. Rey Juan Carlos, SP Stefanos Gritzalis, Univ. of Aegean, GR Peter Herrmann, NTNU, NO Valerie Issarny, INRIA, FR Guenter Karjoth, IBM Research, CH Antonio Lioy, Politecnico di Torino, IT Javier Lopez, Univ. Malaga, SP Fabio Martinelli, IIT-CNR, IT Sjouke Mauw, Technical Univ. Eindhoven, NL Daniel Olmedilla, L3S, GR Babak Sadighi, SICS, SE Luca Vigano', ETH Zurich, CH Will Winsborough, Univ. Texas at S. Antonio, USA Ting Yu, North Carolina State Univ., USA Alec Yasinsac, Florida State Univ., USA
============================================ STM (Security and Trust Management) is a recently established working group of ERCIM (European Research Consortium in Informatics and Mathematics). In association with the workshop there will be a meeting of the ERCIM working group on trust management (to be scheduled either on Wednesday or Thursday at the end of the sessions).