[Apologies if you receive multiple copies of this message]
REGISTRATION INFORMATION AT: http://www.esorics06.tu-harburg.de/registration.html
*********************************************************************** ****PRELIMINARY PROGRAM**** 2ND INTERNATIONAL WORKSHOP ON SECURITY AND TRUST MANAGEMENT (STM'06) Hamburg,Germany - September 20, 2006 (in conjunction with ESORICS 2006) http://www.hec.unil.ch/STM06/
***********************************************************************
Wednesday, 20/9
9:00 - 9:10 Intro by the chairs 9:10 - 10:10 Invited speaker (TBA) 10:10 - 10:40 Coffee break 10:40 - 12:10 SESSION 1: FRAMEWORKS AND SYSTEMS
"The MoR-Trust distributed trust management system: Design and simulation results" by Stephanos Androutsellis-Theotokis, Diomidis Spinellis and Vasileios Vlachos.
"A Scalable Evidence Based Self-Managing Framework for Trust Management" by Mohammad Waseem Hassan, Richard McClatchey and Ian Willers
"Managing Trustworthiness in Component-based Embedded Systems" by Gabriele Lenzini, Andrew Tokmakoff and Johan Muskens
12:10 - 13:45 LUNCH
13:45 - 15:15 SESSION 2: SECURITY & TRUST IN IT
"Security and Trust in IT Business Outsourcing: a Manifesto" by Artsiom Yautsiukhin, Fabio Massacci, Yuecel Karabulut, Florian Kerschbaum and Philip Robinson
"Secure Information Sharing in a Virtual Multi-Agency Team Environment" by Nabil Adam, Ahmet Kozanoglu, Aabhas Paliwal and Basit Shafiq
"Building Reputations for Internet Clients" by Songjie Wei and Jelena Mirkovic
15:15 - 15:45 Break 15:45 - 16:45 SESSION 3: PRIVACY
"Context Privacy with Context Evaluation" by Emin Islam Tatli and Dirk Stegemann
"A Survey on Trust and Privacy Negotiability in the Norwegian Mobile Telecom Market" by Stig F. Mjølsnes and Marius Teigen
Thursday, 21/9
09:00 - 10:30 SESSION 4: SECURITY
"Model and Synthesize Security Automata" by Fabio Martinelli and Ilaria Matteucci
"Towards the construction of Attack Resistant and Efficient Overlay Streaming Topologies" by Thorsten Strufe, Jens Wildhagen and Guenter Schaefer
"Towards Trustworthy Spatial Messaging" by Michel Deriaz and Jean-Marc Seigneur
10:30 - 11:00 Break
11:00 - 12:30 SESSION 5: THEORY
"Partial and fuzzy constraint satisfaction to support coalition formation" by Petros Belsis, Stefanos Gritzalis and Sokratis K. Katsikas
"A Gangmatching Approach to SPKI/SDSI Certificate Discovery" by Nicholas Coleman and Marvin Solomon
"Trust Mass, Volume and Density - a Novel Approach to Reasoning about Trust" by Fredrik Degerlund.
GENERAL CHAIRS Solange Ghernaouti Hélie Univ. Lausanne, CH email: sgh@unil.ch
Ulrich Ultes-Nitsche Univ. Fribourg, CH email: uun@unifr.ch
PROGRAM CO-CHAIRS Sandro Etalle University of Twente, NL email: sandro.etalle@utwente.nl
Pierangela Samarati Universita' di Milano - Italy email: samarati@dti.unimi.it
PUBLICATION CHAIR Sara Foresti Universita' di Milano - Italy email: foresti@dti.unimi.it
PUBLICITY CHAIR Claudio A. Ardagna Universita' di Milano - Italy email: ardagna@dti.unimi.it
PROGRAM COMMITTEE: Viajy Atluri, Rutgers Univ., USA Joris Claessens, Microsoft EMIC, DE Sabrina De Capitani di Vimercati, Univ. Milano, IT Theo Dimitrakos, British Telecom, UK Mara Isabel González Vasco, Univ. Rey Juan Carlos, SP Stefanos Gritzalis, Univ. of Aegean, GR Peter Herrmann, NTNU, NO Valerie Issarny, INRIA, FR Guenter Karjoth, IBM Research, CH Antonio Lioy, Politecnico di Torino, IT Javier Lopez, Univ. Malaga, SP Fabio Martinelli, IIT-CNR, IT Sjouke Mauw, Technical Univ. Eindhoven, NL Daniel Olmedilla, L3S, GR Babak Sadighi, SICS, SE Luca Vigano', ETH Zurich, CH Will Winsborough, Univ. Texas at S. Antonio, USA Ting Yu, North Carolina State Univ., USA Alec Yasinsac, Florida State Univ., USA
============================================ STM (Security and Trust Management) is a recently established working group of ERCIM (European Research Consortium in Informatics and Mathematics). In association with the workshop there will be a meeting of the ERCIM working group on trust management (to be scheduled either on Wednesday or Thursday at the end of the sessions).