PST 2011 top
 
Call for Papers
Important Dates
Committees:
    - Organizing
    - Technical Program
Privacy Theme
Security Theme
Trust Theme
Workshops & Tutorials
Accommodations
Conference Venue &
Travel Information
Paper Submission
Innovation Day
Program
Registration
Partnership / Sponsorship
Speakers

NRC logo

Concordia logo

NCFTA logo

DRDC

ieee

ieeecs

MITACS logo

Cisco logo

CAE

Q1 labs

symantec logo

 

 

 

 

PST2011
Ninth Annual Conference
on Privacy, Security and Trust

Program
(Outline Agenda)

Day 1: Tuesday, July 19, 2011 - Innovation Day at PST 2011

8:00 a.m.  Registration and Breakfast
8:30 a.m. Official Opening PST 2011 Conference
9:00 a.m. PST 2011 Conference Morning Keynote: Emerging Cyber Crime Threats, Ron Plesco, President and CEO, National Cyber-Forensics Training  Alliance, USA
10:00 a.m Refreshment Break
10:15 a.m. PST Morning Workshop / Tutorial: Keeping Your Web Apps Secure: The OWASP Top 10 & Beyond, Robert H’obbes’ Zakon, Zakon Group LLC
10:15 a.m.

PST Symposium Part 1 – Morning Session

12:00 p.m. Luncheon
2:00 p.m. PST 2011 Conference Afternoon Keynote: High Profile Targeted Attacks, Dean Turner, Director, Global Intelligence Network, Symantec
3:00 p.m.       Refreshment Break
3:15 p.m. PST Afternoon Workshop / Tutorial: Ethical Hacking and Network Forensics Investigation Techniques, Dr. Issa Traore, University of Victoria
3:15 p.m. PST Symposium Part 2 - Afternoon Session
6:00 p.m. Networking Reception
7:00 p.m. Adjourn

 

Day 2: Wednesday, July 20, 2011

8:00 a.m.  Registration and Breakfast
9:00 a.m. Academic Keynote: New Combinatorial Techniques for User-Private Information Retrieval, Dr. Douglas Stinson, University of Waterloo
10:00 a.m Refreshment Break
10:20 a.m.

Paper Sessions (Parallel)

12:00 p.m. Luncheon
2:00 p.m. Paper Sessions (Parallel)
3:40 p.m.       Refreshment Break
4:00 p.m. Poster Session
6:00 p.m. PST2011 Banquet, Hotel Maritime Plaza
9:00 p.m. Adjourn


Day 3
: Thursday, July 21, 2011

8:00 a.m.  Registration and Breakfast
9:00 a.m. Academic Keynote: Secure Computational and Storage Outsourcing, Dr. Mikhail Atallah, Purdue University
10:00 a.m Refreshment Break
10:20 a.m.

Paper Sessions (Parallel)

12:00 p.m. Luncheon
2:00 p.m. Paper Sessions (Parallel)
4:00 p.m.       Closing Remarks

 

Detail Technical Program

Day 1: Tuesday, July 19, 2011 - Innovation Day at PST2011

8:00 a.m.  Registration and Breakfast (Atrium of the EV Building)
8:30 a.m.  Official Opening PST2011 Conference (Room EV1.605, EV Building)
9:00 a.m PST 2011 Conference Morning Keynote: Emerging Cyber Crime Threats, Ron Plesco, President and CEO, National Cyber-Forensics Training  Alliance, USA (Room EV1.605, EV Building)
10:00 a.m.

Refreshment Break

10:15 a.m. PST Morning Workshop / Tutorial: Keeping Your Web Apps Secure: The OWASP Top 10 & Beyond, Robert H’obbes’ Zakon, Zakon Group LLC (Room EV3.309, EV Building)
10:15 a.m. PST Morning Workshop / Tutorial: Keeping Your Web Apps Secure: The OWASP Top 10 & Beyond, Robert H’obbes’ Zakon, Zakon Group LLC (Room EV3.309, EV Building)
10:15 a.m.

PST Symposium Part 1 – Morning Session (Room EV1.605, EV Building)

  • C1 KEYNOTE Strategic Implications of Social Media, James Norrie, Ryerson University
  • C2 Overview of modern tools and techniques to capture specialized knowledge, Robert Charpentier, Frédéric Painchaud; DRDC Valcartier
12:00 p.m.     Luncheon (Atrium of the LB Building) 
2:00 p.m. PST 2011 Conference Afternoon Keynote: High Profile Targeted Attacks, Dean Turner, Director, Global Intelligence Network, Symantec (Room EV1.605, EV Building)
3:00 p.m. Refreshment Break
3:15 p.m. PST Afternoon Workshop / Tutorial: Ethical Hacking and Network Forensics Investigation Techniques, Dr. Issa Traore, University of Victoria (Room EV3.309, EV Building)
3:15 p.m.

PST Symposium Part 2 - Afternoon Session (Room EV1.605, EV Building)

  • C3 Public Health Model of Information Security. Peter Cassidy, Anti Phishing Working Group
  • C4 Network Security, Eric Ziegast, Internet Systems Consortium
  • C5 MASAS Multi-Agency Situational Awareness, Doug Allport Owner, Allport Group Inc.
6:00 p.m Networking Reception (11th Floor, EV11, EV Building)
7:30 p.m. Adjourn


Day 2 : Wednesday, July 20, 2011

8:00 a.m.  Registration and Breakfast (Atrium of the EV Building)
9:00 a.m Keynote Talk:  Douglas Stinson, University of Waterloo (Room EV1.605, EV Building. Chair: Ali Ghorbani)
10:00 a.m.

Refreshment Break

10:20 a.m.

Security Track  (Room EV1.605, EV Building. Chair: Nadia Tawbi)

Abbas Javadtalab, Laith Abbadi, Mona Omidyeganeh, Carlisle Adams, Shervin Shirmohammadi and Abdulmotaleb El Saddik. Transparent Non-Intrusive Multimodal Biometric System For Video Conference Using The Fusion Of Face And Ear Recognition

Nick Mailloux, Ali Miri and Monica Nevins. Forward Secure Identity-based Key Agreement for Dynamic Groups

Jiangong Weng and Amy Felty. An Implementation of a Verification Condition Generator for Foundational Proof-Carrying Code

Bernard Stepien, Amy Felty and Stan Matwin. Advantages of a Non-Technical XACML Notation in Role-Based Models

10:20 a.m.

Trust track  (Room EV1.615, EV Building. Chair: Greg Sprague)

Mark Manulis and Marion Steiner. UPBA: User-Authenticated Property-Based Attestation

Joshua Gorner, Jie Zhang and Robin Cohen. Improving the Use of Advisor Networks for Multi-Agent Trust Modelling

Jesus Gonzalez, Mohd Anwar and James B.D. Joshi. A Trust-based Approach against IP-spoofing Attacks

Kevin Ouyang, Binod Vaidya and Dimitrios Makrakis. A Probabilistic-Based Approach towards Trust Evaluation using Poisson Hidden Markov Models and Bonus Malus Systems

12:00 p.m.      Luncheon (Atrium of the LB Building) 
2:00 p.m.

Security Track  (Room EV1.615, EV Building. Chair: Amy Felty)

Shirantha Wijesekera, Xu Huang and Dharmendra Sharma. Performance Analysis of QKD Based Key Distribution for IEEE 802.11 Networks

François Gauthier, Dominic Letarte, Thierry Lavoie and Ettore Merlo. Extraction and Comprehension of Moodle’s Access Control Model: A case study

Roopa Vishwanathan and Steve Tate. General Secure Function Evaluation Using Standard Trusted Computing Hardware

Dina Said, Lisa Stirling, Peter Federolf and Ken Barker. Data Preprocessing for Distance-based Unsupervised Intrusion Detection

2:00 p.m.

Privacy Track (Room EV1.605, EV Building. Chair: Frédéric Cuppens)

Tristan Allard, Benjamin Nguyen and Philippe Pucheral. Safe Realization of the Generalization Privacy Mechanism

Ali Noman, Sk. Md. Mizanur Rahman and Carlisle Adams. Improving Security and Usability of Low Cost RFID Tags.

Sk. Md. Mizanur Rahman, Md. Mehedi Masud, Carlisle Adams, Khalil El-Khatib, Hussein Mouftah and Eiji Okamoto. Cryptographic Security Models for eHealth P2P Database Management Systems Network

Esma Aïmeur and David Schönfeld. The ultimate invasion of privacy: identity theft

3:40 p.m. Refreshment Break
4:20 p.m.

POSTER SESSION  (Room EV2.260, EV Building)

Hagen Stübing, Murat Ceven and Sorin A. Huss. Short Paper: Diffie-Hellman based Group Signatures for Car-to-X Communication

Abdulsalam Yassine, Ali Asghar Nazari Shirehjini, Shervin Shirmohammadi and Thomas T.Tran. Online Information Privacy: Agent-Mediated Payoff

Martín Barrere, Gustavo Betarte and Marcelo Rodríguez. Towards machine-assisted formal procedures for the collection of digital evidence

Lilia Georgieva. Modelling of security properties in Alloy

Serguei Mokhov. On the Need for Data Flow Graph Visualization of Forensic Lucid Programs and Encoded Evidence, and their Evaluation by GIPSY

Riaz Ahmed Shaikh, Kamel Adi, Luigi Logrippo and Serge Mankovski. Risk-based Decision Making Method for Access Control Systems

Yoshihiro Kaneko, Yuji Kinpara and Yuta Shiomi. A Hamming Distance-like Filtering in Keystroke Dynamics

6:00 p.m PST2011 Banquet, Hotel Maritime Plaza
9:00 p.m. Adjourn

 

Day 3 : Thursday, July 21, 2011

 

8:00 a.m.  Registration and Breakfast (Atrium of the EV Building)
9:00 a.m Keynote: Mikhail Atallah, Purdue University (Room EV1.605, EV Building. Chair: Mourad Debbabi)
10:00 a.m.

Refreshment Break

10:20 a.m.

Security Track  (Room EV1.615, EV Building. Chair Carlisle Adams)

Sherif Saad, Issa Traore, Ali Ghorbani, Bassam Sayed, David Zhao, Wei Lu, John Felix and Payman Hakimian. Detecting P2P Botnets through Network Behavior Analysis and Machine Learning

Dakshita Khurana and Aditya Gaurav. Ensuring Tight Computational Security Against Higher-Order DPA Attacks

Nagajyothi Gunti, Weiqing Sun and Mohammed Niamat. I-RBAC: Isolation Enabled Role-Based Access Control

Johannes Viehmann. Secure communication with secret sharing in static computer networks with partition in mistrust parties

10:20 a.m.

10:20-12:00  Privacy Track  (Room EV1.605, EV Building. Chair: Benjamin Fung)

Qi Xie and Urs Hengartner. Privacy-Preserving Matchmaking For Mobile Social Networking

Jens H. Weber-Jahnke and James Williams. Beyond Privacy Policies - Assessing Inherent Privacy Risks of Consumer Health Services

Alberto Vila Tena and Yrjö Raivio. Privacy Challenges of Open APIs: Case Location Based Services

Md. Moniruzzaman and Ken Barker. Delegation of access rights in a privacy preserving access control model

12:00 p.m.     Luncheon (Atrium of the LB Building) 
2:00 p.m.

Security Track  (Room EV1.615, EV Building. Chair: Esma Aïmeur )

Qian Yu and Chang N. Zhang. RC4 State and Its Applications

Paolo Gasti and Alessio Merlo. On Re-use of Randomness in Broadcast Encryption

Mohammad Parham and John William Atwood. Validation of Security for Participant Control Exchanges in Multicast Content Distribution

Samir Ouchani, Yosr Jarraya and Otmane Ait Mohamed. Model-Based Systems Security Quantification

2:00 p.m.

Privacy and Trust Track  (Room EV1.605, EV Building. Chair: Lingyu Wang)

Mahmoud Ghorbel, Armen Aghasaryan, Stéphane Betgé-Brezetz, Marie-Pascale Dupont, Guy-Bertrand Kamga and Sophie Piekarec. Privacy Data Envelope: Concept and Implementation

Naveed Ahmad, Haitham Cruickshank, Zhili Sun and Muhammad Asif. Pseudonymised Communication in Delay Tolerant Networks

Zainab M. Aljazzaf, Miriam A. M. Capretz and Mark Perry. Trust Bootstrapping Services and Service Providers

4:00 p.m. Closing Remarks



 

 

Call for Papers | Important Dates | Organizing Committee | Technical Program Committee | Privacy Theme | Security Theme | Trust Theme | Workshops & Tutorials |Accommodations, Conference Venue & Travel Information | Paper Submission | Innovation Day | Program | Registration | Partnership / Sponsorship | Speakers | Home
Copyright © 2004 - 2011 "PSTnet.ca". All Rights Reserved.
last revised July 18, 2011