IFIPTM Preliminary Program

8:00-9:00      REGISTRATION

9:00-9:15      WELCOME

9:15-10:30    KEYNOTE I

  1. From Access Control to Trust Management, and Back -- a Petition

  2. D. Gollmann

10:30-11:00  COFFEE BREAK

11:00-12:30  TRUST MODELS I

  1. Detecting and Reacting to Changes in Reputation Flows

  2. Sini Ruohomaa, Aleksi Hankalahti and Lea Kutvonen

  3. Validation and Verification of Agent Models for Trust: Independent compared to Relative Trust

  4. Mark Hoogendoorn, S. Waqar Jaffry and Peter-Paul Van Maanen

  5. Composing Trust Models towards Interoperable Trust Management

  6. Rachid Saadi, Mohammad Ashiqur Rahaman, Valerie Issarny and Alessandra Toninelli

12:30-14:00  LUNCH

14:00-15:30  TRUST & CLUSTERING

  1. Identifying Knots of Trust in Virtual Communities

  2. Nurit Gal-Oz, Ran Yahalom and Ehud Gudes

  3. Clustering Recommenders in Collaborative Filtering Using Explicit Trust Information

  4. Georgios Pitsilis, Xiangliang Zhang and Wei Wang

  5. From Reputation Models and Systems to Reputation Ontologies

  6. Rehab Alnemr and Christoph Meinel

15:30-16:00  COFFEE BREAK

16:00-17:30  SHORT PAPER SESSION I

  1. Security and Privacy Issues and the Current Regulatory Framework on e-consumer Protection in Victoria, Australia

  2. Huong Ha

  3. Proximity-Based Trust Inference for Mobile Social Networking

  4. Amir Seyedi, Rachid Saadi and Valerie Issarny

  5. Trust-Threshold Based Routing in Delay Tolerant Networks

  6. Moonjeong Chang, Ing-Ray Chen, Fenye Bao and Jin-Hee Cho

  7. A Trust Management Framework for Wireless Networks using Fuzzy Set and Grey theory

  8. Ji Guo, Alan Marshall and Bosheng Zhou

Wednesday

Thursday

Friday

8:00-9:15      COFFEE BREAK

9:15-10:30    KEYNOTE II

  1. Phishing for trust: Understanding why users trust their software [slides of the talk]

  2. Angela Sasse

10:30-11:00  COFFEE BREAK

11:00-12:30  PRIVACY

  1. Enhancing Data Privacy in the Cloud

  2. Yanbin Lu and Gene Tsudik

  3. Longitude: a Privacy-preserving Location Sharing Protocol for Mobile Applications

  4. Changyu Dong and Naranker Dulay

  5. An Empirical Evaluation of the Compliance of Game-Network Providers with Data-Protection Law

  6. Thorben Burghardt, Klemens Böhm, Markus Korte and Simon Bohnen

12:30-14:00  LUNCH

14:00-15:00  TRUST MODELS II

  1. Physiological Measurement of Trust-Related Behavior in Trust-Neutral and Trust-Critical Situations

  2. Karin Leichtenstern, Nikolaus Bee, Elisabeth André, Ulrich Bermüller and Johannes Wagner

  3. Privacy-respecting Reputation for Wiki Users

  4. Stefanie Pötzsch, Benjamin Kellermann and Sandra Steinbrecher

15:00-16:00  POSTERS AND DEMONSTRATIONS

Coffee will be available during this session

16:00-17:00  WORKING GROUP MEETING

Anual meeting of the IFIP WG 11.11, all conference participants automatically become members of the working group and are invited to make their voice heard during this meeting.

19:00           CONFERENCE DINNER

9:00-10:30    TRUST MODELS III

  1. On Tradeoffs between Trust and Survivability using a Game Theoretic Approach

  2. Jin-Hee Cho and Ananthram Swami

  3. Prob-Cog: an Adaptive Filtering Model for Trust Evaluation

  4. Zeinab Noorian, Stephen Marsh and Michael Fleming

  5. Trusted Principal-Hosted Certificate Revocation

  6. Sufatrio and Roland H.C. Yap

10:30-11:00  COFFEE BREAK

11:00-12:30  SHORT PAPER SESSION II

  1. Regulatory Impact of Data Protection and Privacy in the Cloud

  2. Sakshi Porwal, Srijith K. Nair and Theo Dimitrakos

  3. Assessment of the Trustworthiness of Digital Records

  4. Jianqiang Ma, Habtamu Abie, Torbjørn Skramstad and Mads Nygård

  5. Taste and Trust

  6. Audun Jøsang and Walter Quattrociocchi

  7. Trust Dynamics: A Data-Driven Simulation Approach

  8. Olufunmilola Onolaja, Rami Bahsoon and Georgios Theodoropoulos

12:30-13:00  FAREWELL AND PRESENTATION OF VENUE FOR IFIPTM 2012

13:00-14:00  LUNCH