Coffee | ||
8:30 | Welcome and Introduction |
Tuomas Aura |
Session 1 | ||
8:40 | Enhancing Network Security by Using Social Contacts | Syed Safi Ali Shah |
9:00 | Privacy Protection in Social Networking Services | Daoyuan Li |
9:20 | Designing User Centric Privacy Policy | Puneet Kaur |
9:40 | Reputation in Cloud Computing | Adrian Yanes |
10:00 | Comparing various realizations of the cloud computing paradigm | Bo Pang |
10:20 | Coffee Break | |
Session 2 | ||
10:40 | Comparison between security solutions in Cloud and Grid Computing | David Muñoz Sanchez |
11:00 | Applicability Analysis of Grid Security Mechanism on cloud Networking | Rasib Hassan Khan |
11:20 | Secure and anonymous communication in the cloud | Risto Laurikainen |
11:40 | Lunch Break | |
Session 3 |
||
12:40 | Security concerns in commercial cloud computing | Jaime Jimenez |
13:00 | Monitoring Intrusions and Security Breaches in Highly Distributed Cloud Environments | Aryan Taheri |
13:20 | Security Challenges in Hybrid Cloud Infrastructure | Koushik Annapureddy |
13:40 | Coffee Break | |
Session 4 |
||
14:00 | Privacy Challenges of open APIs: Case LBS | Alberto Vila Tena |
14:20 | Network Coding for DoS resistance | Max Suraev |
14:40 | Multipath Routing, Congestion Avoidance and DDos Resistance | Kari Visala |
15:00 | Coffee Break | |
Session 5 |
||
15:20 | Cryptanalysis of Cubehash | Vikash Jha |
15:40 | Recent Attacks on Tor | Juha Salo |
16:00 | Novel CAPTCHA schemes | Ville Saalo |
16:20 | Break | |
Session 6 |
||
17:20 | Biometric authentication Today | Tjark Vandommele |
17:40 | Strong Authentication with mobile phones | Janne Kaavi |
18:00 | Privacy in Mobile-ticketing | Rushil Dave |
18:20 | Trustworthy Identity Management for Web Authentication | Ramasivakarthik Mallavarapu |
18:40 | Credential Remote Management | Laura Marcia Villalba Monne |
19:00 | Closing Remarks | |