University of Passau
Department of Informatics and Mathematics
IT-SEC 
   University of Passau  >  FIM  >  IT-SEC  >  News > Archive of Events & Conferences      SiteMapSitemap  Seitenende

ARCHIVE of Events & Conferences XML RSS 2.0 Feed XML RSS 2.0 Feed

This page gives an overview of all events and conferences IT-SEC was invovled (conference committees, talks, etc.) in:


28.10.2018 AICCSA 2018
15th ACS/IEEE International Conference on Computer Systems and Applications AICCSA 2018
Conference Dates: 
28.10.2018-01.11.2018
Location:  Aqaba, Jordan
Link: 
The ACS/IEEE International Conference on Computer Systems and Applications (AICCSA) is the premier conference covering all contemporary areas in computer systems and applications and hence it is an international forum for leading researchers and practitioners in this important and rapidly changing disciplines. AICCSA 2018, to be held in the lovely and highly vibrant city of Aqaba in Jordan.

03.09.2018 ESORICS 2018
European Symposium on Research in Computer Security
Conference Dates: 
03.09.-07.09.2018
Deadline: 
18.04.2018
Location:  Barcelona, Spain
Link: 
Computer security is concerned with the protection of information in environments where there is a possibility of intrusion or malicious action. The aim of ESORICS is to further the progress of research in computer security by establishing a European forum for bringing together researchers in this area, by promoting the exchange of ideas with system developers and by encouraging links with researchers in related areas.

Progressively organized in a series of European countries, the symposium is confirmed as the European research event in computer security.

Since its inception in 1990, ESORICS has been hosted in a series of European countries and has established itself as the premiere European research event in computer security. Recent editions of ESORICS were held in Oslo - Norway (2017), Heraklion - Greece (2016), Vienna - Austria (2015), Wroclaw - Poland (2014), Egham - United Kingdom (2013), Pisa - Italy (2012) and Leuven - Belgium (2011).

25.04.2018 Sicherheit 2018
Jahrestagung des Fachbereichs Sicherheit
Conference Dates: 
25.04.-27.04.2017
Deadline: 
30.11.2017
Location:  Konstanz
Link: 

14.11.2017 ANT 2018
International Conference on Ambient Systems, Networks and Technologies
Conference Dates: 
08.05.-11.05.2018
Deadline: 
15.12.2017
Location:  Porto, Portugal
Link: 
The 9th International Conference on Ambient Systems, Networks and Technologies (ANT-2018) is a leading international conference for researchers and industry practitioners to share their new ideas, original research results and practical development experiences from all Ambient Systems, Networks and Technologies related areas. ANT 2018 will be held in conjunction with the 8th International Conference on Sustainable Energy Information Technology (SEIT 2018).

14.11.2017 IFIP 2018
ITIP World Computer Congress 2018
 Dates: 
17.09.-21.09.2018
Location:  Poznan, Polen
Link: 


The congress will combine content from industry and research, providing a place for integrating these two sectors as well as offering an opportunity to showcase and discover innovative ideas
The content will range from the latest international research, to leading commercial and industry-focused advancements
WCC will provide a unique opportunity to share with and listen to world-renowned experts in research and industry
An important part of WCC will be keynotes given by world-class researchers and leading IT practitioners
We aim at inviting the Alan Turing Award holders
The content will be provided as: keynote talks, regular presentations, panels, workshops, and contests
The main topics of the Congress will be focused on: Networks and Hardware, Software, Security, Data Science, Social Aspects of Information Technologies


13.11.2017 ICDEc 2018
International Converence on Digital Economy
Conference Dates: 
03.05.-05.05.2018
Deadline: 
15.11.2017
Location:  Vannes, Frankreich
Link: 
The ICDEc conference is an opportunity to bring together researchers and experts in emerging technologies from both public and private sectors to discuss issues related to the development, implementation, use and management of emerging technologies and the move to digital economy. The conference is an occasion to link technology developers, who are mainly computer scientists, with users, who are more project managers. It is an opportunity to explore ideas, exchange thoughts and implement research projects between these two main actors of the digital economy.

05.10.2017 OID 2017
Open Identity Summit 2017
Conference Dates: 
05.10.-06.10.2017
Deadline: 
14.05.2017
Location:  Karlstad, Sweden
Link: 
Important dates

Paper Submission Deadline: 14th May 2017

Notification of Acceptance: 15th June 2017

Submission of Camera Ready Copies: 21th July 2017

Early bird registration deadline: June 29, 2017

28.09.2017 WISTP 2017
International Conference on Information Security Theory and Practice
Conference Dates: 
28.09.-29.09.2017
Deadline: 
15.06.2017
Location:  Crete, Greece
Link: 
The 11th WISTP International Conference on Information Security Theory and Practice (WISTP'2017) seeks original submissions from academia and industry presenting novel research on all theoretical and practical aspects of security and privacy, as well as experimental studies of fielded systems, the application of security technology, the implementation of systems, and lessons learned. We encourage submissions from other communities such as law, business, and policy that present these communities' perspectives on technological issues.

In 2007, Workshop in Information Security Theory and Practice (WISTP) was created as a forum for bringing together researchers and practitioners in related areas and to encourage interchange and cooperation between the research community and the industrial/consumer community. From 2015, due to increased participation it has become a Conference.

Submissions with regards to the security of future ICT technologies, such as cyber-physical systems, cloud services, data science and the Internet of Things are particularly welcome.

Other topics of interest include, but are not limited to:

* Security and Privacy in Smart Devices
- Biometrics, National ID cards
- Embedded Systems Security and TPMs
- Interplay of TPMs and Smart Cards
- Mobile Codes Security
- Mobile Devices Security
- Mobile Malware
- Mobile OSes Security Analysis
- New Applications for Secure RFID Systems
- RFID Systems
- Smart Card
- Smart Devices Applications
- Wireless Sensor Node

* Security and Privacy in Networks
- Ad Hoc Networks
- Delay-Tolerant Network
- Domestic Network
- GSM/GPRS/UMTS Systems
- Peer-to-Peer Networks
- Security Issues in Mobile and Ubiquitous Networks
- Sensor Networks: Campus Area, Body Area, Sensor and Metropolitan Area Networks
- Vehicular Network
- Wireless Communication: Bluetooth, NFC, WiFi, WiMAX, others

* Security and Privacy in Architectures, Protocols, Policies, Systems and Applications
- BYOD Contexts
- Cloud-enhanced Mobile Security
- Critical Infrastructure (e.g. for Medical or Military Applications)
- Cyber-Physical Systems
- Digital Rights Management (DRM)
- Distributed Systems and Grid Computing
- Information Assurance and Trust Management
- Intrusion Detection and Information Filtering
- Lightweight cryptography
- Localization Systems (Tracking of People and Goods)
- M2M (Machine to Machine), H2M (Human to Machine) and M2H (Machine to
Human)
- Mobile Commerce
- Multimedia Applications
- Public Administration and Governmental Services
- Pervasive Systems
- Privacy Enhancing Technologies
- Secure self-organization and self-configuration
- Security Models, Architecture and Protocol: for Identification and Authentication, Access Control, Data Protection
- Security Policies (Human-Computer Interaction and Human Behavior Impact)
- Security Measurements
- Smart Cities
- Systems Controlling Industrial Processes

11.09.2017 ESORICS 2017
European Symposium on Research in Computer Security
 Dates: 
11.09.-15.09.2017
Deadline: 
19.04.2017
Location:  Oslo, Norwegen
Link: 
Workshop proposal due March 6
Workshop notification March 10
Paper submission deadline April 19
Author Notification June 16
Camera ready copy June 26
Conference September 11-13
Workshops September 14-15

ESORICS is the annual European research event in Computer Security. The Symposium started in 1990 and has been held in several European countries, attracting a wide international audience from both the academic and industrial communities. Papers offering novel research contributions in computer security are solicited for submission to the Symposium. The primary focus is on original, high quality, unpublished research and implementation experiences. We encourage submissions of papers discussing industrial research and development.



06.09.2017 ISCISC 2017
International ISC Conference on Information Security & Cryptology
 Dates: 
06.09.-07.09.2017
Location:  Shiraz University, Shiraz, Iran
Link: 

07.06.2017 APF
Annual Privacy Forum
Conference Dates: 
07.06.-08.06.2017
Location:  Wien, Österreich
Link: 
When Jun 7, 2017 - Jun 8, 2017
Where Vienna
Submission Deadline Mar 31, 2017
Notification Due Apr 30, 2017
Final Version Due May 15, 2017

In APF 2017 we invite papers presenting original work on the themes of data protection and privacy and their repercussions on technology business, government, law, society, policy and on law enforcement. An inter-disciplinary approach is high in demand to contribute to bridging the gap between research, business models and policy much like proposing new models and interpretations are.

29.05.2017 IFIPSEC 2017
ICT Systems Security and Privacy Protection
Conference Dates: 
29.05.-31.05.2017
Location:  Rom, Italien
Link: 
Submissions due: January 9, 2017 (11:59pm American Samoa Time) - Extended
Notification of acceptance: February 24, 2017
Deadline for final version: March 7, 2017
Conference: May 29-31, 2017

Submission Guidelines

Submitted papers must be original, unpublished, and not submitted to another conference or journal for consideration. Accepted papers will be presented at the conference and included in the conference proceedings published in the IFIP Advances in Information and Communication Technology (AICT) series by Springer Science and Business Media.

All papers must be written in English. Submissions should be at most 14 pages long in total including references and appendices. Submissions should not be anonymized. Program Committee members are not required to read the appendices, so the paper should be intelligible without them.

Authors must follow the Springer formatting instructions. Each paper will receive at least three reviews. At least one author of each accepted paper must register by the early registration date indicated on the conference website and present the paper.

After the conference, extended versions of selected papers will be considered for publication in the journal Computers & Security. Those papers will undergo at least one other review round.

04.05.2017 ICDEc 2017
Second International Conference on Digital Economy
Conference Dates: 
04.05.-06.05.2017
Location:  Sidi Bou Said, Tunisia
Link: 

10.04.2017 SHCIS 2017
4th Workshop on Security in highly connected IT systems
 Dates: 
1906.2017 - 22.06.2017
Location:  Neuchâtel, Switzerland
Link: 

10.04.2017 TrustBus 2017
14th International Conference on TRUST, PRIVACY AND SECURITY IN DIGITAL BUSINESS
Conference Dates: 
28.08.2017 - 31.08.2017
Location:  Lyon, France
Link: 

TrustBus'2017 aims at providing an international forum for researchers and practitioners to exchange information regarding advancements in the state of the art and practice of trust and privacy in digital business. We will seek research papers, work-in-progress reports and industrial experiences, describing advances in all areas of digital business applications related to trust and privacy.


29.03.2017 ComNet 2017
6th International Conference on Communications and Networking
Conference Dates: 
29.03.-01.04.2017
Location:  Hammamet, Tunisa
Link: 
When Mar 29, 2017 - Apr 1, 2017
Where Hammamet Tunisa
Submission Deadline Oct 5, 2016
Notification Due Nov 30, 2016
Final Version Due Dec 20, 2016

14.03.2017 TrustBus 2017
14th International Conference on TRUST, PRIVACY AND SECURITY IN DIGITAL BUSINESS
Conference Dates: 
28.08.-31.08.2017
Deadline: 
12.04.2017
Location:  Lyon, France
Link: 

12.12.2016 Workshop on User centric security, privacy and interoperability in the context of Internet of Things and Smart Cities
Workshop Dates: 
12-14 December 2016
Deadline: 
31.07.2016
Location:  Reston, USA
Link: 

29.11.2016 ICICS 2016
Conference Dates: 
29.11.2016-02.12.2016
Deadline: 
20.08.2016
Location:  Singapore
Link: 

07.11.2016 IoT2016
The 6th International Conference on the Internet of Things (IoT 2016)
 Dates: 
07.11.-09.11.2016
Deadline: 
13.06.2016
Location:  Stuttgart, Germany
Link: 
IMPORTANT DATES
Registration

Early Bird Registration deadline: October 2, 2016

Paper deadlines

Abstract Registration: June 13, 2016
Paper Submission: June 20, 2016
Acceptance notice: August 7, 2016
Camera-Ready Submission: September 7, 2016

Workshop proposal deadlines

Proposal submission: May 27, 2016
Acceptance notice: continuous
Camera-Ready submission: TBA

Poster deadlines

Abstract due: August 21, 2016
Acceptance notice: September 4, 2016
Camera-Ready Submission: September 18, 2016

Demo deadlines

Abstract due: August 21, 2016
Acceptance notice: September 4, 2016
Camera-Ready Submission: September 18, 2016


13.10.2016 Anwendung von Editierbaren Signaturen in der Digitalen Archivierung
Event Dates: 
CAST-WS Sichere digitale Archivierung
Location:  Darmstadt, Germany
Link: 
Editierbare Signaturen erlauben für begrenzte vom Aussteller der Signatur vorher festgelegte Bereiche nachträgliche Modifikationen an einem bereits signierten Dokument. Dies kann ohne Kenntnis des geheimen Signaturschlüssels des Ausstellers erfolgen, weshalb dieser weiterhin die Kontrolle des Signaturschlüssels behält. Der Vortrag beleuchtet mögliche Rechtsfolgen die beim Einsatz editierbarer Signaturen im Vergleich zu anerkannten Standard Signaturen entstehen im Lichte der eIDAS Verordnung. Des Weiteren beschreibt er auf abstrakten Level mögliche Vorteile beim Einsatz dieser Signaturen bei der datenschutzfreundlichen Weitergabe von Daten welche aufgrund ihrer Schutzniveaus mit Signaturen versehen wurden

26.09.2016 WISTP 2016
the 10th WISTP International Conference on Information Security Theory and Practice (WISTP 2016)
Event Dates: 
26.-27.09.2016
Deadline: 
04.06.2016
Location:  Heraklion, Crete, Greece
Link: 
Steering committee

Raja Naeem Akram, Royal Holloway University of London, UK
Angelos Bilas, FORTH-ICS & University of Crete, Greece
Sushil Jajodia, George Mason University, USA
Konstantinos Markantonakis, ISG-SCC, Royal Holloway University of London, UK
Joachim Posegga, Institute of IT-Security and Security Law at the University of Passau, Germany
Jean-Jacques Quisquater, ICTEAM, Catholic University of Louvain, Belgium
Damien Sauveron, XLIM, University of Limoges, France

26.09.2016 ESORICS 2016
the 21st European Symposium on Research in Computer Security
Event Dates: 
26.-30.09.2016
Deadline: 
01.05.2016
Location:  Heraklion, Crete, Greece
Link: 

07.09.2016 APF2016
the Annual Privacy Forum 2016
Event Dates: 
07.-08.09.2016
Deadline: 
31.03.2016
Location:  Frankfurt
Link: 
Program Committee

26.07.2016 SECRYPT 2016
SECRYPT is part of ICETE, the 13th International Joint Conference on e-Business and Telecommunications
Event Dates: 
26.-28.07.2016
Deadline: 
02.06.2016
Location:  Lisbon, Portugal
Link: 
PROGRAM COMMITTEE
Joachim Posegga, Institute of IT Security and Security Law, Germany

22.07.2016 Identity Management challenges present while creating the AGILE gateway
GETD#4 Summit & Hackathon Berlin
Conference Dates: 
22.-23.07.2016
Location:  Berlin
Link: 
GETD#4 Summit & Hackathon Berlin

08.02.2016 Third International BIOMICS Workshop
Workshop Dates: 
08.-10. February 2016
Deadline: 
11.01.2016
Location:  University of Passau, Passau, Germany
Link: 

06.12.2015 IEEE GLOBECOM 2015
Conference Dates: 
06.-10.12.2015
Deadline: 
01.07.2015
Location:  San Diego, USA
Link: 
The proliferation of new services in the mobile market is driving the QoS requirements ever higher (in terms of performance indicators spanning throughput, delays, network coverage etc). Meanwhile, a multitude of battery-hungry mobile devices are either connected to the Internet or are about to be. Following this trend, physical objects along with services are gaining a central role, shaping the Internet of Things. At larger scales, buildings and whole cities are also becoming smarter, embracing a wide range of technologies to enhance and improve the quality of everyday living, contributing at the same time to the global target of reducing energy consumption.

10.11.2015 OID 2015
Open Identity Sumit 2015
Conference Dates: 
10.-11.11.2015
Deadline: 
29.05.2015
Location:  Berlin
Link: 
The aim of the Open Identity Summit 2015 is to link practical experiences and requirements with academic innovations. Focus areas will be Research and Applications in the area of Identity Management, Trust Services, Open Source, End-to-End Encryption and Cloud Computing.

Paper Submission Deadline: 29th May 2015 Notification of Acceptance: 29th June 2015 Submission of Camera Ready Copies: 15th August 2015

26.10.2015 IoT2015
The 5th International Conference on the Internet of Things
Conference Dates: 
26.-28.10.2015
Deadline: 
04.06.2015
Location:  Seoul, South Korea
Link: 

09.09.2015 ISC 2015
The Eighteenth Information Security Conference
Conference Dates: 
09.09.2015 - 11.09.2015
Deadline: 
27.04.2015
Location:  Trondheim, Norway
Link: 

24.08.2015 WISTP 2015
The 9th International Conference on Information Security Theory and Practice.
Conference Dates: 
24.08.-25.08.2015
Deadline: 
10.04.2015
Location:  Heraklion, Greece
Link: 

02.08.2015 HAS 2015 - Human Aspects of Information Security, Privacy and Trust
In the context of HCI International 2015
Conference Dates: 
02. - 07.08.2015
Location:  Los Angeles, CA, USA
Link: 
Ambient, non-intrusive security, privacy and trust mechanisms
- Balancing user friendliness and strong security
- Computer ethics and security
- Cyber security awareness raising, education and training programs
- Cyber security policies and user behavior
- Economics of cyber security
- Effects of security systems upon user, corporate, and governmental behavior
- End-user interactions with trusted platforms
- Formulation and impacts of national cyber security strategies, policies and standards
- Human behavior in cyber security and privacy
- Human cyber forensics
- Human factors in cyber security incident response
- Human factors of Privacy Enhancing Technologies
- Human vulnerabilities in network and system security
- Intelligence-driven cyber security
- Leveraging behavioral science for cyber security risk mitigation
- Marketing models for end user security
- Patterns of security, privacy and trust practices in human-computer interactions
- Secure and trustworthy life-logging
- Security and privacy in social networking
- Security of cyber-physical-human systems and human-in-the-loop cyber-physical systems
- Simplifying risk management and threat assessment
- Social engineering and other human-related risks
- The role of end users on cyber security risks and their mitigation
- The role of security, privacy and trust in human-computer interactions
- Trustworthy biometric security
- Usable security and privacy
- User acceptance of security policies and technologies
- User psychology and social influence in security and privacy decisions
- User security and privacy by design


Program Board

Program Chairs:

Theo Tryfonas
University of Bristol, United Kingdom
Theo Tryfonas

Ioannis Askoxylakis
Foundation for Research & Technology - Hellas (FORTH), Greece
Ioannis Askoxylakis


Board Members:
Claudio Agostino Ardagna, Università degli Studi di Milano, Italy
Stefan Bauer, Vienna University of Economics and Business, Austria
Zinaida Benenson, University of Erlangen-Nuremberg, Germany
Kim-Kwang Raymond Choo, University of South Australia, Australia
Lynne Coventry, Northumbria University, United Kingdom
Marc Dacier, Symantec Research Labs, United States
Simone Fischer-Huebner, Karlstad University, Sweden
Steven Furnell, Plymouth University, United Kingdom
Tyrone Grandison, Proficiency Labs, Oregon, United States
Ulrike Hugl, University of Innsbruck, Austria
Michael Huth, Imperial College London, United Kingdom
Murray Jennex, San Diego State University, United States
Kevin Jones, City University London, United Kingdom
Kristiina Karvonens, Aalto University, Helsinki, Finland
Kaido Kikkas, Tallinn University, Estonia
Dong-Seong Kim, University of Canterbury, New Zealand
Gabriele Lenzini, University of Luxembourg, Luxembourg
Kai-Uwe Loser, Ruhr-University Bochum, Germany
Muthucumaru Maheswaran, McGill University, Canada
Steve Marsh, University of Ontario Institute of Technology (UOIT), Canada
Noluntu Mpekoa, Central University of Technology, South Africa
Masakatsu Nishigaki, Shizuoka University, Japan
Jason Nurse, University of Oxford, United Kingdom
M. Maina Olembo, SecUSo, TU Darmstadt, Germany
Joon Suk Park, Syracuse University, United States
Aljosa Pasic, ATOS, Spain
Milan Petković, Philips Research, Netherlands
Joachim Posegga, Universtät Passau, Germany
Sören Preibusch, University of Cambridge / Microsoft Research, United Kingdom
Jean-Jacques Quisquater, Université catholique de Louvain, Belgium
Ken Stavinoha, Cisco Systems, United States
Kerry-Lynn Thomson, Nelson Mandela Metropolitan University, South Africa
Melanie Volkamer, Center for Advanced Security Research Darmstadt (CASED), Germany
Steffen Wendzel, Fraunhofer, Germany
Yao Zhao, Beijing Jiaotong University, P.R. China

26.07.2015 NTMS 2015
7th IFIP International Conference on New Technoligies, Mobility and Security
Conference Dates: 
26.07.-29.07.2015
Location:  Paris
Link: 
NTMS\'2015 is the Seven IFIP International Conference on New Technologies, Mobility and Security that will be held from 26 to 29 July 2015. NTMS\'2015 conference is technically by IFIP TC6.5 WG.


NTMS\'2015 aims at fostering advances in the areas of New Technologies, Wireless Networks, Mobile Computing, Ad hoc and Ambient Networks, QoS, Network Security and E-commerce, to mention a few, and provides a dynamic forum for researchers, students and professionals to present their state-of-the-art research and development in these interesting areas. The event will be combined with tutorial sessions and workshops. Tutorials will precede the main program, aiming at the dissemination of mature knowledge and technology advances in the field.

Two or more Workshops will immediately follow the main conference, offering the opportunity for a more focused exchange of ideas and presentation of on-going research relevant to following tracks:



Track 1: Mobility & Wireless Networks
Track 2: Security
Track 3: New Technologies & Services

20.07.2015 SECRYPT 2015
12th International Conference on Security and Cryptography
Conference Dates: 
20. -22. July 2015
Deadline: 
03.03.2015
Location:  Colmar, France
Link: 
SECRYPT is an annual international conference covering research in information and communication security. The 12th International Conference on Security and Cryptography (SECRYPT 2015) will be held in Colmar, France on 20-22 July 2015.
The conference seeks submissions from academia, industry, and government presenting novel research on all theoretical and practical aspects of data protection, privacy, security, and cryptography.
Papers describing the application of security technology, the implementation of systems, and lessons learned are also encouraged. Papers describing new methods or technologies, advanced prototypes, systems, tools and techniques and general survey papers indicating future directions are also encouraged.

15.06.2015 MSPN 2015
International Conference on Mobile, Secure and Programmable Networking
Conference Dates: 
15.06.-17.06.2015
Deadline: 
26.02.2015
Location:  Paris, France
Link: 
Program Committee Chairs
Selma Boumerdassi, INRIA, France
Eric Renault, Institut Mines-Télécom -- Télécom SudParis, France
Samia Bouzefrane, CNAM, France

Steering Committee
Abdella Battou, NIST, USA
Pierre Paradinas, CNAM, France
Omar Charkaoui, UQAM, Canada
Damien Sauveron, University of Limoges, France

Publicity Chair
Ruggero Donida Labati, Universita\' degli Studi di Milano, Italy

Technical Program Committee
Claudio A. Ardagna, Universita` degli Studi di Milano, Italy
Ioannis Askoxylakis, FORTH-ICS, Greece
Chakib BEKARA, University of Tlemcen, Algeria
André-Luc Beylot, ENSEEIHT, France
Weiwei Chen, Google Inc., USA
Mauro Conti, University of Padua, Italy
Mehammed Daoui, University Mouloud Mammeri of Tizi-Ouzou, Algeria
Yuhui Deng, Jinan University, China
Wassim Drira, Qatar Mobility Innovations Center, Qatar
José María de Fuentes, Carlos III University of Madrid, Spain
Viet Hai HA, Hue University, Vietnam
M-Tahar Kechadi, University College Dublin, Ireland
Karim Khireddine, Université de Béjaia, Algeria
Andrea Lanzi, University of Milan, Italy
Sjouke Mauw, University of Luxembourg, Luxembourg
Alessio Merlo, University of Genova, Italy
Ruben Milocco, Universidad Nacional del Comahue, Argentina
Pascale Minet, Inria, France
Paul Muhlethaler, Inria, France
Henrich C. Pöhls, Institute of IT Security and Security Law at the University of Passau, Germany
Christina Pöpper, Ruhr-University Bochum, Germany
Laurent Roullet, Alcatel Lucent Bell Labs Villarceaux
Shiju Sathyadevan, Amrita University, Kerala, India
Ahmed Soua, NIST, USA
Xuan-Tu Tran, Vietnam National University, Vietnam
Chao Wang, Arizona State university, USA
Qian Wang, Wuhan University, China
Muhammad Younas, Oxford Brookes University, UK
Stefano Zanero, Politecnico di Milano, Italy
Weishan Zhang, University of Petroleum, China
Rong Zheng, MacMaster university, Canada

02.02.2015 Oberseminar talk: DoS from the browser: Bring your safari or win chrome!
presented by Juan David Parra
Event Dates: 
02.02.2015 - 14:00
Location:  ITZ 010 (University of Passau)
Link: 

27.11.2014 Santa\'s Crypto Get-Together 2014
Workshop Dates: 
27.-28.11.2014
Deadline: 
30.09.2014
Location:  Prague, Czech Republic
Link: 
Santa\'s Crypto Get-Together (SantaCrypt) started in December 2001 as the first annual Czech and Slovak workshop aiming to facilitate closer cooperation of professionals working in the field of applied cryptography and related areas of security. This get-together of experts is organised in order to foster exchange of information and ideas on past, ongoing, and also future projects. We recognise the need of experts meeting their colleagues without the hassle of taking care of their (potential) customers, bosses and other distracting forces. ;-) The workshop is run in English in the first day and then Czech and Slovak the second day.

There will be five invited lectures:
•Joachim Posegga (Univ. Pasov, SRN)
•Gregor Leander (Ruhr-Univ. Bochum, SRN)
•Karthik Bhargavan (independent researcher, Indie)
•Karsten Nohl (independent researcher, SRN)
<br>
Program Committee
•Vašek Matyáš, FI MU, Brno, ÈR – PC Chair
•Michal Hojsík, UK, Praha, CZ
•Marek Kumpošt, NetSuite & FI MU, Brno, CZ
•Tomáš Rosa, Raiffeisenbank, Brno, CZ
•Ludìk Smolík, Siegen, DE
•Martin Stanek, UK, Bratislava, SR
•Pavol Zajac, STU, Bratislava, SK

24.11.2014 Oberseminar talk: Data Aggregation on Energy Consumption Data
presented by Henrich C. Pöhls
Event Dates: 
24.11.2014 - 14:00
Location:  ITZ 010 (University of Passau)
Link: 

11.11.2014 Airbus Group Karriere Veranstaltung
Location:  Ottobrunn / München
Link: 
exklusives Event der Airbus Group aufmerksam, bei dem 30 Studierende der Informatik (und ähnlicher Studiengänge) am 11. November zu unserem Standort Ottobrunn / München eingeladen werden: Expiscor IT / Computer Science

Die Veranstaltung wird den Studierenden einen exklusiven Einblick in die Luft- und Raumfahrtbranche gewähren und richtet sich speziell an besagte IT-Profile.

Auszug der Agenda:

• Interaktive Vorträge von Produkt-und Serviceabteilungen wie beispielsweise den Bereichen Forschung und Entwicklung (Innovation Works), Cyber Security, Software Tools für Flight Test und Simulation und Mission Planning Software
• Interaktive Karriereübungen, mithilfe derer die Studierenden ihre Stärken und Werte entdecken sowie ihr Auftreten in Job-Interviews und Assessment Centern optimieren lernen
• Individuelle CV-Beratung mit Recruitern der Airbus Group, die den Studierenden helfen, die Qualität ihrer Bewerbungen und ihrer „Employability“ zu steigern
• „Get Together“ mit Recruitern und Fachbereichsleitern der Airbus Group zu allen Themen rund um Praktika, Abschlussarbeiten und Einstiegsmöglichkeiten im Unternehmen

Die Veranstaltung richtet sich insbesondere an Studierende, die derzeit auf der Suche nach einem Praktikum oder einer Abschlussarbeit sind.

10.11.2014 Oberseminar talk: Abstract State Machines Coalgebraically: an Example
presented by Eric Rothstein
Event Dates: 
10.11.2014 - 14:00
Location:  ITZ 010 (University of Passau)
Link: 

04.11.2014 OID 2014
Open Identity Summit
Conference Dates: 
04.11.-06.11.2014
Deadline: 
15.05.2014
Location:  Stuttgart
Link: 
The aim of Open Identity Summit 2014 is to link practical experiences and requirements with academic innovations. Focus areas will be Research and Applications in the area of Identity Management and Open Source with a special focus on Cloud Computing.
Open standards and interfaces as well as open source technologies play a central role in the current identity management landscape as well as in emerging future scenarios based on cloud computing for example.
While there are already plenty of successful applications in which those techniques are used to guarantee the authenticity and integrity of entities, there are still many closely related areas which demand further research.
We invite stakeholder and technical experts from public administration, industry, science and academia to propose contributions to the program of the workshop. Submissions should be short papers (5-6 pages) or full papers (max. 12 pages) in English. Submitted papers will be reviewed by the program committee.
Accepted papers will be presented at the workshop and are planned to be published in the GI-Edition Lecture Notes in Informatics (LNI).

Program Committee 2014
• Arslan Brömme (GI/BIOSIG, DE)
• Bud Bruegger (Fraunhofer IAO, DE)
• Hartje Bruns (bos, DE)
• Christoph Busch (CAST-Forum, DE)
• Victor-Philipp Busch (Uni HH, DE)
• Roger Dean (EEMA, UK)
• Jos Dumortier (KU Leuven, BE)
• Jan Eichholz (G&D, DE)
• Torsten Eymann (Uni BT, DE)
• Arno Fiedler (Nimbus, DE)
• Simone Fischer-Hübner (Karlstads Universitet)
• Lothar Fritsch (NR, NO)
• Jens Fromm (Fraunhofer FOKUS, DE)
• Walter Fumy (Bundesdruckerei, DE)
• Robert Garskamp (IDentity.Next, NL)
• Ulrich Greveler (HS RW, DE)
• Thomas Groß (UNEW, UK)
• Marit Hansen (ULD, DE)
• Oliver Hinz (TU DA, DE)
• Olaf Herden (DHBW, DE)
• Jaap-Henk Hoepman (Rudboud Universiteit)
• Gerrit Hornung (Uni Passau, DE)
• Moritz Horsch (TU DA, DE)
• Detlef Houdeau (Infineon, DE)
• Detlef Hühnlein (ecsec, DE)
• Jan Jürjens (TU DO, DE)
• Michael Kubach (Fraunhofer IAO)
• Andreas Kuckartz (W3C FSW CG)
• Andreas Kühne (Trustable, DE)
• Sebastian Kurowski (Fraunhofer IAO)
• Herbert Leitold (A-SIT, AT)
• Luigi Lo Iacono (FH Cologne, DE)
• Nils Magnus (LinuxTag, DE)
• Tarvi Martens (SK, EE)
• Gisela Meister (G&D, DE)
• Pablo Mentzinis (BITKOM, DE)
• Wolf Müller (HU Berlin, DE)
• Anja Lehmann (IBM, CH)
• Peter Lipp (TU Graz, AT)
• Johannes Loxen (SerNet, DE)
• Alexander Nouak (Fraunhofer IGD)
• Axel Nennker (DTAG, DE)
• Eray Özmü (Universität Stuttgart)
• Sebastian Pape (TU DO, DE)
• René Peinl (HS Hof, DE)
• Sachar Paulus (FH Brandenburg, DE)
• Henrich C. Pöhls (Uni Passau, DE)
• Marco von der Pütten (bos, DE)
• Kai Rannenberg (JWG Uni, DE)
• Volker Roth (FU Berlin, DE)
• Alexander Roßnagel (Uni Kassel, DE)
• Heiko Roßnagel (Fraunhofer IAO)
• Ivonne Scherfenberg (Bundesdruckerei, DE)
• Johannes Schmölz (ecsec, DE)
• Jörg Schwenk (RU Bochum, DE)
• David Simonsen (WAYF, DK)
• Don Thibeau (OIDF, USA)
• Thomas Uhl (OSBA, DE)
• Tobias Wich (ecsec, DE)
• Thomas Wieland (HS Coburg, DE)
• Alex Wiesmaier (AGT, DE)
• Klaus-Dieter Wolfenstetter (DTAG)
• Xuebing Zhou (CASED, DE)
• Jan Zibuschka (Bosch, DE)
• Frank Zimmermann (Novartis, CH)


03.11.2014 Online-Karrieremesse der Siemens AG
Link: 
Neugierig auf die Zukunft?
Entdecken Sie Ihre Perspektiven im IT-Bereich bei Corporate
Technology, der zentralen Forschungs- und Entwicklungsabteilung
bei Siemens.
Treffen Sie unsere Fachexperten und informieren Sie sich
über Einstiegs- und Entwicklungsmöglichkeiten.
&#9654; Internet of Things -
Solutions for the networked world
&#9654; Automation Solution -
Driving the future of automation
&#9654; Software Architecture -
Our future is built on software
&#9654; Business Analytics -
Creating knowledge from data
&#9654; Digitalisation -
Combining intelligent control and human
interaction for smart applications
&#9654; IT Security -
Technology for the future
siemens.de/online-karrieremesse

27.10.2014 WEBSAND: Eingebauter Schutz für ein sichereres Web-Erlebnis
Link: 
EU-Forscher entwickelten einen innovativen Sicherheitsrahmen, der sowohl Internetnutzern als auch Entwicklern einen größeren Schutz vor Cyberangriffen bietet.

Der Monat Oktober wurde zum European Cyber Security Month (Europäischer Monat für Cybersicherheit) ausgerufen und das Bewusstsein für Onlinesicherheit in der EU ist so groß wie nie. Cyberkriminalität kostet die europäische Wirtschaft laut Schätzungen jährlich etwa zehn Milliarden Euro, wobei ein Großteil davon auf den Diebstahl von Kreditkartendaten, die später auf dem Schwarzmarkt verkauft werden, zurückzuführen ist.
Eines der Projekte, das die EU Im Kampf gegen die Cyberkriminalität und zur Förderung der Sicherheit im Internet finanziert, nennt sich WEBSAND (Server-driven Outbound Web-application Sandboxing), welches bereits neue Tools entwickelte, die es Hackern erschweren, die Systeme zu knacken.
Die Computerwissenschaftler von WEBSAND haben auf \\\"Sandkästen\\\" basierende Lösungen entworfen, restriktive Mechanismen, die die Serversysteme sowie Informationsflüsse (zwischen Servern und den Browsern der Nutzer) von nicht vertrauenswürdigem Code trennen.

DAS INTERNET VERBESSERN
\\\"Der wichtigste Erfolg von WEBSAND war, dass wir den Entwicklern gezeigt haben, wie man Sicherheit zu einem standardmäßigen Bestandteil des Systems macht anstatt zu einem nachträglichen Aufwand“, erklärte der Koordinator Dr. Martin Johns.
Das Internet hat sich seit dem Jahr 1990, als es noch als statisches Tool zur Bereitstellung von Dokumenten genutzt wurde, entscheidend verändert. Es hat sich mittlerweile zu einer in Echtzeit aus multiplen Quellen gespeisten Umgebung entwickelt, die Entwickler dazu neigen lässt, Sicherheit den Systemen direkt hinzuzufügen anstatt sie zu einem integralen Bestandteil des Client-Server-Modells zu machen. WEBSAND wurde gegründet, um eine solche Veränderung herbeizuführen.

\\\"Wir haben uns zu Projektbeginn bewusst ein sehr ehrgeiziges Ziel gesetzt. Wir dachten: \\\'Lasst uns versuchen, das Internet zu verbessern.\\\' Dieses Ziel haben wir bis zu einem gewissen Grad erreicht. Wir haben direkt auf der Serverseite eine Menge Lösungen zur Umsetzung des Sicherheitsniveaus, den wir für bestimmte Bereiche erwarten, integriert.\\\"

Das Ziel war, den Entwickler durch einen Server-basierten Sicherheitsansatz und die Bildung eines modularen, einfach zu nutzenden Rahmens das Ruder in die Hand zu geben, damit Entwicklern sogar mit begrenzten Kenntnissen im Bereich der IT-Sicherheit verlässlich sichere Anwendungen entwickeln können.

Darüber hinaus hat WEBSAND eine Reihe von Browser-Erweiterungen für Endnutzer entwickelt. Diese umfassen CSFIRE, welches für Nutzer \\\"unsichtbar\\\" ist, das es die Funktionalität der Anwendungen, die es verwenden (z. B. E-Mail-Programm, Facebook, Google oder ein Währungsrechner), nicht beeinträchtigt, während es sie transparent vor Web-Angriffen schützt.

Die Wissenschaftler von WEBSAND haben zudem Lösungen für einige der grundsätzlichen, fortlaufenden Probleme des Internets untersucht und gefunden:
Sie haben eine leichte Ergänzung zur Client-Seite von Browsern entworfen, die DNS-Rebinding-Angriffe verhindern, eine weit verbreitete Methode zur Gewinnung von Daten aus einem Server ohne das Wissen des Hosts. Eine kleine Erweiterung der \\\"Same-Origin-Policy\\\" setzt dieser Gefahr ein Ende.

Darüber hinaus haben Sie auch einen anderen Weg für die Authentifizierung von Passwörtern entwickelt, indem sie ein neues Challenge-Response-System implementieren, das vom Server und nicht vom Browser eingeleitet wird.

Nun arbeiten die Hauptpartner des Projekts, die deutschen Unternehmen SAP und Siemens sowie die Universitäten von Leuven in Belgien und Chalmers in Schweden, mit den internationalen Internet-Normenorganisationen W3C und IETF, um Browserunternehmen davon zu überzeugen, die WEBSAND-Technologie zu übernehmen. Zudem sind sie ein Teil der gemeinnützige Organisation OWASP (Open Web Application Security Project) und bewerben ihre Erkenntnisse durch deren Nutzergruppen und Meetings.

\\\"Bei SAP und Siemens verwenden wir die WEBSAND-Technologie, um unsere eignen Produkte sicherer zu machen. Wir würden jedoch auch direkt von einem Internet profitieren, das standardmäßig sicher ist\\\", sagt Dr. Johns. \\\"Sicherheit ist sehr teuer und ein sichereres Internet würde es Unternehmen außerdem erlauben, einen größeren Teil ihrer Ressourcen für die Funktionalität ihrer Produkte und Dienstleistungen einzusetzen.\\\"

WEBSAND, das von Oktober 2010 bis April 2014 lief, erhielt vom Siebten Forschungsrahmenprogramm Finanzmittel in Höhe von EUR 3,2 Mio. und bestand aus fünf Partnern in drei Ländern.

27.10.2014 IoTaaS 2014
International Conference on IoT as a Service
Conference Dates: 
27.-29.10.2014
Deadline: 
15.06.2014
Location:  Rome, Italy
Link: 
The IoT era is widely seen as looming just around the corner, if not closer than that. The amount of smart devices is huge and grows in a staggering rate, while connectivity gets a wider coverage. Smart objects get immersed in everyday life and the amount and variety of contextual data they can produce, or the actions they can take on their immediate environment, is enormous. At the same time smart objects are getting smarted and their battery life gets longer.
For this trend to have a big impact, be successful, and be widely adopted and useful it needs to be tightly integrated with the most advanced operational technology trend of “Everything as a Service”. This deployment paradigm will enable the easy adoption of IoT based services and applications by end users, while forcing smart objects providers as well as platform middleware providers to architect their solutions accordingly. To maximize impact and adoption, the development of such newly created applications should be made as accessible as possible, such that the entry barrier for new innovations in this area is lowered. Moreover, the same rule of thumb applies also for the ingestion and exposure of smart objects via the platform.
The “IoT as a Service” conference, as a part of the IoT 360 Summit, is meant to bring together researchers and practitioners, from academia and from the industry, being it large Telcos and service providers, or SMEs who are interested in creating IoT based value added services. The main aim is to present existing, evolving, or novel ideas, exchange points of view, and foster discussions and future collaborations between different stakeholders. Papers are welcomed representing the point of view of middleware and platform providers, smart object providers, application developers, as well as researchers.
The “IoT as a Service” conference is seeking original research and industrial papers on the confluence of IoT and advanced delivery models. Accepted papers will be published online in the conference proceeding’s web site. Selected papers will be considered for publication in the EAI Transactions on Cloud Systems. “IoT as a Service” aims to foster an international research agenda of a practical nature.


General Chairs:
Eliezer Dekel, IBM Research - Haifa
Benny Mandler, IBM
Program Chair:
Benny Mandler, IBM
Steering Committee Chair:
Imrich Chlamtac, Create-Net, EAI, Italy
Program Committee Members:
Gari Singh, IBM
Vivi Fragopoulou, FORTH
Prof. Dana Petcu, West University of Timisoara
Stephan Steglich, Fraunhofer FOKUS
Beniamino Di Martino, Second University of Naples
Kostas Magoutis, University of Ioannina and ICS-FORTH
Sotiris Ioannidis, FORTH
Joachim Possega, University of Passau
Dimosthenis Kyriazis, National Technical University of Athens
Conference Coordinator
Giorgia Nisi, EAI, Italy

20.10.2014 Oberseminar talk: Identity Management in Platforms Offering IoT as a Service
presented by Juan David Parra
Event Dates: 
20.10.2014 - 14:00
Location:  ITZ 010 (University of Passau)
Link: 

06.10.2014 Oberseminar talk: Bring your own Laptop! Parasitic web demo!
presented by Juan David Parra
Event Dates: 
06.10.2014 - 14:00
Location:  ITZ 010 (University of Passau)
Link: 

17.09.2014 Oberseminar talk: Steps and Challenges in Certificate based Entity Authentication
thesis presented by Markus Doering (supervised by Prof. Dr. J. Posegga and Henrich C. Pöhls)
Event Dates: 
17.09.2014 - 11:30
Location:  ITZ 010 (University of Passau)
Link: 

11.09.2014 7th SETOP International Workshop on Autonomous and Spontaneous Security
Deadline: 
21.05.2014
Location:  Wroclaw, Poland
Link: 

Autonomous and Spontaneous security focuses on the dynamics of system behaviour in response to threats, their detection, characterisation, diagnosis and mitigation in particular through architectural and behavioural reconfiguration. Such approaches are needed in Embedded Systems, Pervasive Computing, and Cloud environments, which bridge the physical, social, and computing worlds and challenge traditional security provisions from different perspectives. Systems must be agile and continue to operate in the presence of compromise, introspective and self-protecting rather than just hardened, resilient to more complex threats yet more vulnerable as they are physically accessible, widely heterogeneous and need to integrate long-term legacy components.

Ensuring their resilience and protecting such systems at scale requires novel solutions across a broad spectrum of computational and resource environments, that integrate techniques from different areas including security, network management, machine learning, knowledge representation, control theory, stochastic analysis and software engineering amongst others.

General Chair:
Frédéric Cuppens (TELECOM Bretagne, France)

Program Committee Chairs:
Emil C Lupu (Imperial College London, UK)
Joachim Posegga (Univ. of Passau, DE)


01.09.2014 TrustBus 2014
11th International Conference on Trust, Privacy & Security in Digital Business
Conference Dates: 
01.09.-05.09.2014
Location:  Munich
Link: 
The advances in the Information and Communication Technologies (ICT) have raised new opportunities for the implementation of novel applications and the provision of high quality services over global networks. The aim is to utilize this ‘information society era’ for improving the quality of life for all citizens, disseminating knowledge, strengthening social cohesion, generating earnings and finally ensuring that organizations and public bodies remain competitive in the global electronic marketplace.

Unfortunately, such a rapid technological evolution cannot be problem free. Concerns are raised regarding the ‘lack of trust’ in electronic procedures and the extent to which ‘information security’ and ‘user privacy’ can be ensured.

In answer to these concerns, the 11th International Conference on Trust, Privacy and Security in Digital Business (TrustBus’14) will provide an international forum for researchers and practitioners to exchange information regarding advancements in the state of the art and practice of trust, security and privacy in digital business.

TrustBus’14 will bring together researchers from different disciplines, developers, and users all interested in the critical success factors of digital business systems. We are interested in papers, work-in-progress reports, and industrial experiences describing advances in all areas of digital business applications related to trust and privacy, including, but not limited to:

Anonymity and pseudonymity in business transactions
Delivery technologies and scheduling protocols
Economics of Information Systems Security
Enterprise management and consumer protection
Intellectual property and digital rights management
Languages for description of services and contracts
Models for access control and authentication
New cryptographic building-blocks for e-business applications
PKI & PMI
P2P transactions and scenarios
Reliability and security of content and data
Reputation in services provision
Security and Privacy models for Pervasive Information Systems
Shopping, trading, and contract management tools
Transactional Models
Usability of security technologies and services
Business architectures and underlying infrastructures
Common practice, legal and regulatory issues
Cryptographic protocols
Design of businesses models with security requirements
Electronic cash, wallets and pay-per-view systems
Identity and Trust Management
Intrusion detection and information filtering
Management of privacy & confidentiality
Multimedia web services
Online transaction processing
Public administration, governmental services
Real-time Internet E-Services
Reliable auction, e-procurement and negotiation technology
Secure process integration and management
Security Policies
Smartcard technology
Trust and privacy issues in mobile commerce environments
Trust and Big Data

IMPORTANT DATES

20.08.2014 Oberseminar talk: Implementing Coalgebraic Specifications
presented by Eric Rothstein
Event Dates: 
20.08.2014 - 11:30
Location:  ITZ 010 (University of Passau)
Link: 

14.07.2014 DBSec’14
28th Annual IFIP WG 11.3 Working Conference on Data and Applications Security and Privacy
Conference Dates: 
14.07.-16.07.2014
Location:  Vienna, Austria
Link: 

The 28th Annual IFIP WG 11.3 Working Conference on Data and Applications Security and Privacy provides a forum for presenting original unpublished research results, practical experiences, and innovative ideas in data and applications security and privacy. Papers and panel proposals are also solicited.

The DBSec’14 will be held at the Vienna University of Technology, Vienna, Austria, July 14-16, 2014.

09.07.2014 Oberseminar talk: Steps and Challenges in Certificate based Entity Authentication
thesis presented by Markus Doering (supervised by Prof. Dr. J. Posegga and Henrich C. Pöhls)
Event Dates: 
09.07.2014 - 11:30
Location:  ITZ 010 (University of Passau)
Link: 

07.07.2014 8th IFIP WG 11.11 International Conference on Trust Management 2014
Conference Dates: 
07.07.-10.07.2014
Location:  Singapore
Link: 

IFIPTM 2014 will be the 8th International Conference on Trust Management under the auspices of IFIP. The mission of the IFIPTM 2014 Conference is to share research solutions to problems of Trust and Trust management, and to identify new issues and directions for future research and development work.

This event is the continuation of a successful series of events published by Springer under the AICT series.

03.07.2014 NFSP 2014
3rd International Workshop on Network Forensics, Security and Privacy (NFSP)
Workshop Dates: 
03.07.2014
Location:  Madrid, Spain
Link: 
Program committee (more to be added)


•Hani Alzaid, KACST, Saudi Arabia
•Jordi Castellà, Universitat Rovira i Virgili, Spain
•Bin Dai, Huazhong University of Science and Technology, China
•Lijuan Duan, Beijing University of Technology, China
•Pep-Lluis Ferrer, University of Balearic Islands, Spain
•Steven Furnell, Plymouth University, UK
•Joaquin Garcia-Alfaro, Telecom SudParis, France
•Yong Guan, Iowa State University, USA
•Sghaier Guizani, Alfaisal University, KSA
•Song Guo, University of Aizu, Japan
•Martin Hell, Lund University, Sweden
•Juan Hernandez, UPC, Spain
•Yuming Jiang, Norwegian University of Science and Technology, Norway
•Rajgopal Kannan, Louisiana State University, USA
•Igor Kotenko, SPIIRAS, Russia
•Costas Lambrinoudakis, University of Piraeus, Greece
•Ming Li, Utah State University, USA
•Hong Liu, University of Massachusetts Dartmouth, USA
•Jorge Lopez, Indra & University Carlos III of Madrid, Spain
•Kostas Markantonakis, Royal Holloway, UK
•Fabio Martinelli, CNR, Italy
•Wojciech Mazurczyk, Warsaw University of Technology, Poland
•Peter Mueller, IBM Zurich Research Laboratory, Switzerland
•David Naccache, ENS, France
•Ana Nieto, University of Malaga, Spain
•Ahmed Patel, Universiti Kebangsaan, Malaysia & Kingston University, UK
•Jens Myrup Pedersen, Aalborg University, Denmark
•Joachim Posegga, University of Passau, Germany
•Bimal Roy, Indian Statistical Institute, India
•Damien Sauveron, University of Limoges, France
•Jennifer Seberry, University of Wollongong, Australia
•Bo Sheng, University of Massachusetts Boston, USA
•Harry Skianis, University of the Aegean, Greece
•Juan Tapiador, Universidad Carlos III de Madrid, Spain
•Theo Tryfonas, University of Bristol, UK
•Xin-Wen Wu, Griffith University, Australia
•Christos Xenakis, University of Piraeus, Greece
•Yang Xiang, Deakin University, Australia
•Shucheng Yu, University of Arkansas at Little Rock, USA
•Jun Zhang, Deakin University, Australia
•Guofeng Zhao, Chongqing University of Posts and Telecommunications, China
•Kai Zheng, IBM Research, China

30.06.2014 WISTP 2014
Conference Dates: 
30.06.-02.07.2014
Deadline: 
07.03.2014
Location:  Heraklion, Greece
Link: 


General chair

Ioannis Askoxylakis, FORTH-ICS, Greece

Local organisers

Nikolaos Petroulakis, FORTH-ICS, Greece

Workshop/panel/tutorial chair

Publicity chairs

Sara Foresti, Universita` degli Studi di Milano, Italy
Cheng-Kang Chu, Huawei, Singapore
to be extended

Program Chairs

David Naccache, Ecole Normale Supérieure, France
Damien Sauveron, XLIM, University of Limoges, France

Program Committee

Raja Naeem Akram, University of Waikato, NZ
Claudio A. Ardagna, Universita` degli Studi di Milano, Italy
Ioannis Askoxylakis, FORTH-ICS, Greece
Gildas Avoine, INSA de Rennes, France
Lejla Batina, Radboud University Nijmegen, The Netherlands
Lorenzo Cavallaro, Royal Holloway, University of London, UK
Hervé Chabanne, Morpho, France
Serge Chaumette, LaBRI, University Bordeaux 1, France
Mauro Conti, University of Padua, Italy
Manuel Egele, Carnegie Mellon University, USA
Flavio Garcia, University of Birmingham, UK
Dieter Gollmann, Hamburg University of Technology, Germany
Johann Groszschädl, Universität Luxemburg, Luxembourg
Yong Guan, Iowa State University, USA
Gerhard Hancke, City University of Hong Kong, Hong Kong
Süleyman Kardas, TUBITAK BILGEM UEKAE, Turkey
Issa Mohammad Khalil, Qatar Fondation, Qatar
Ioannis Krontiris, Goethe University Frankfurt, Germany
Andrea Lanzi, Insitut Eurecom, France
Corrado Leita, Symantec Research Labs, France
Albert Levi, Sabanci University, Turkey
Peng Liu, Pennsylvania State University, USA
Javier Lopez, Computer Science Department, University of Malaga, Spain
Federico Maggi, Politecnico di Milano, Italy
Vashek Matyas, Masaryk University, Czech Republic
Sjouke Mauw, University of Luxembourg, Luxembourg
Aikaterini Mitrokotsa, Chalmers University of Technology, Sweden
Flemming Nielson, Technical University of Denmark, Denmark
Vladimir A Oleshchuk, University of Agder, Norway
Frank Piessens, Katholieke Universiteit Leuven, Belgium
Wolter Pieters, TU Delft and University of Twente, The Netherlands
Henrich C. Pöhls, Institute of IT Security and Security Law at the University of Passau, Germany
David Pointcheval, ENS Computer Science Department, France
Christina Pöpper, Ruhr-University Bochum, Germany
Axel York Poschmann, Nanyang Technological University, Singapore
Jean-Jacques Quisquater, UCL Crypto Group, Louvain-la-Neuve, Belgium
Kui Ren, State University of New York at Buffalo, USA
Vincent Rijmen, University of Leuven, Belgium
Reihaneh Safavi-Naini, University of Calgary, Canada
Kouichi Sakurai, Kyushu University, Japan
Pierangela Samarati, Universita` degli Studi di Milano, Italy
Seungwon Shin, KAIST, Korea
Jose Maria Sierra, Carlos III University of Madrid, Spain
Asia Slowinska, Vrije Universiteit Amsterdam, The Netherlands
Willy Susilo, University of Wollongong, Australia
Michael Tunstall, Cryptography Research Inc, USA
Umut Uludag, TUBITAK-BILGEM UEKAE, Turkey
Stefano Zanero, Politecnico di Milano, Italy
Jianying Zhou, Institute for Infocomm Research, Singapore
TBC

Steering committee

Angelos Bilas, FORTH-ICS & University of Crete, Greece
Lorenzo Cavallaro, Royal Holloway, University of London, UK
Dieter Gollmann, Hamburg University of Technology, Germany
Konstantinos Markantonakis, ISG-SCC, Royal Holloway University of London, UK
Jean-Jacques Quisquater, DICE, Catholic University of Louvain, Belgium
Damien Sauveron, XLIM, University of Limoges, France

Copyright © 2007-2014 WISTP · Design by Damien Sauveron &

22.06.2014 HCI International 2014
Conference Dates: 
22.06.-27.06.2014
Deadline: 
07.02.2014
Location:  Creta Maris, Heraklion, Crete, Greece
Link: 
Board Members:

Claudio Agostino Ardagna, Italy
Zinaida Benenson, Germany
Bryan Cline, United States
Sadie Creese, United Kingdom
Jorge Cuellar, Germany
Marc Dacier, United States
Theo Dimitrakos, United Kingdom
Steven Furnell, United Kingdom
Dieter Gollmann, Germany
Jaap-Henk Hoepman, Netherlands
Michael Huth, United Kingdom
Kevin Jones, United Kingdom
Kaido Kikkas, Estonia
Javier Lopez, Spain
Steve Marsh, Canada
Gregorio Martinez, Spain
Emilio Mordini, Italy
Yuko Murayama, Japan
Masakatsu Nishigaki, Japan
Jason Nurse, United Kingdom
Aljosa Pasic, Spain
Milan Petkovi&#263;, Netherlands
Joachim Posegga, Germany
Jean-Jacques Quisquater, Belgium
Fuming Shih, United States
George Spanoudakis, United Kingdom
Ken Stavinoha, United States
Kerry-Lynn Thomson, South Africa
Theo Tryfonas, United Kingdom
João Vilela, Portugal
Claire Vishik, United Kingdom
Melanie Volkamer, Germany


10.06.2014 ACNS 2014
12th International Conference on Applied Cryptography and Network Security
Conference Dates: 
10. - 13. June 2014
Location:  Lausanne (Swiss)
Link: 
Henrich C. Pöhls will be present at the ACNS conference. He will attend the 12th International Conference on Applied Cryptography and Network Security taking place from 10th of June till 13th of June in Lausanne (Swiss) and present results from RERUM.

He will present the paper ‘On Updatable Redactable Signatures’ authored by H. C. Pöhls and K. Samelin in a presentation on Friday 13th of June.

The paper is about so called redactable signatures, which allow removing parts from signed documents. During the course of the EU FP7 project RERUM he gathered the state-of-the-art of malleable signature schemes and our analysis of security models revealed that the existing models do not capture the possibility that the signer can “update” signatures, i.e., add new elements. Neglecting this in the model, the models would tolerate that third parties can generate forgeries if they are given access to an update oracle. Moreover, the analysis showed that there are constructions which permit creating a signature by merging two redacted messages, if they stem from the same original. Again the short coming of previous models is that this is not explicitly described. The paper presents an adjusted definition that captures both possibilities. Moreover, the paper presents a provably secure construction in the standard model, which makes use of a novel trapdoor-accumulator.

04.06.2014 Oberseminar talk: IoT Week presentation: Security Framework in COMPOSE
presented by Juan David Parra
Event Dates: 
04.06.2014 - 11:30
Location:  ITZ 010 (University of Passau)
Link: 

02.06.2014 RAMCOM 2014 (in conjunction with ANT 2014)
International Workshop on Recent Advances on Machine-to-Machine Communication
Workshop Dates: 
02.06.-05.06.2014
Location:  Hasselt, Belgium
Link: 
TPC members

Abdelfettah Belghith HANALab, ENSI, University of Manouba, Tunisia
Khalil Drira LAAS-CNRS, France
Thierry Monteil LAAS-CNRS, INSA Toulouse, France
Pierre Roux CEA, Paris, France
Mounir Kellil CEA, Paris, France
Noureddine Hamdi HANALab, INSAT, University Carthage, Tunisia
Anis Koubaa PSU, KSA
Mounir Frikha Mediatron, SupCom, Tunisia
Mohamed Abid CES, ENIS, Tunisia
Marion Berbineau IFSTTAR, France
Issam Mabrouki HANALab, EPT, University Carthage, Tunisia
Amine Dhraief HANALab, ISIK, University Kairouan, Tunisia
Nessrine Chakchouk HANALab, ENSI, University of Manouba, Tunisia
Sofiene Tahar Concordia University, Canada
Mohamed Jmaiel Redcad, ENIS, University of Sfax, Tunisia
Alfredo Grieco Politecnico di Bari, Italy
Mohamed Younis University of Maryland BC, USA
Imen Jemili HanaLab, ENSI, University of Manouba, Tunisia
Lotfi Kamoun ENIS, University of Sfax, Tunisia
Noureddine Boudriga SupCom, University of Carthage, Tunisia
Mohamed Mosbah Labri, Bordeaux, France
Joachim Posegga Universitry of Passau, Germany
MedAmine Abid HanaLab, ENSI, University of Manouba, Tunisia
Faouzi Derbel University Leibzig, Germany
Abdelmajid Khalil Huawei Tech, Duesseldorf, Germany
Mohamed Aissa University Nizwa, Oman
Bilel Derbel INRIA Lille, France
Raouf Boutaba University of Waterloo, Canada
Sadok Bouamama HanaLab, ENSI, University of Manouba, Tunisia
Amel Benslimane HanaLab, ENSI, University of Manouba, Tunisia
Nabil Tabbane Mediatron, SupCom, Tunisia
Fethi Filali
QMIC, Qatar

Ismehene Chahbi HANALab, ISIK, University Kairouan, Tunisia
Syrine Tlili HanaLab, ENSI, University of Manouba, Tunisia
Faouzi Derbel HTWK, Leipzig, Germany
Habib Youssef CCK, Tunisia

28.05.2014 Oberseminar talk: Mitigating Impersonation Attacks on Web Authentication Using Device
thesis presented by Johannes Koestler (supervised by Prof. Dr. J. Posegga and Bastian Braun)
Event Dates: 
28.05.2014 - 11:30
Location:  ITZ 010 (University of Passau)
Link: 

27.05.2014 The Third ASE International Conference on Cyber Security
International WOrkshop on Cloud Security (IWOCS)
Workshop Dates: 
27.05.-31.05.2014
Deadline: 
01.04.2014
Location:  Stanford, CA, USA
Link: 
Date of Workshop: 27.05.2014

Workshop chairs
•ANTONIO MUÑOZ, University of Málaga, Spain
•ERNESTO DAMIANI, University of Milan, Italy

Programe Committee
•ALCARAZ-CALERO, JOSE M., Hewlett-Packard, UK
•ANTON DEL PINO, PABLO, U. of Málaga, Spain
•BOYD, COLIN, Queensland U. of Tech., Australia
•COLLBERG, CHRISTIAN, Arizona University, USA
•CUELLAR, JORGE, Siemens, Germany
•DAVIDS, CAROL, Illinois Institute of Technology, USA
•DUSIT NIYATO, Nanyang Technological U., Singapore
•ENDICOTT-POPOVSKY, BARBARA, U. of Washington, USA
•FERNANDEZ, EDUARDO B., Florida Atlantic U., USA
•GIORGINI, PAOLO, University of Trento, Italy
•GRAWROCK, DAVID, Intel, USA
•GÜRGENS, SIGRID, Fraunhofer SIT, Germany
•JÜRJENS, JAN, TU of Dortmund, Germany
•KIYOMOTO, SHINSAKU, KDDI R&D Labs, Japan
•LAMBRINOUDAKIS, COSTAS, U. of Piraeus, Greece
•LAURENCE T. YANG, St Francis Xavier University, Canada
•LEVI, ALBERT, Sabanci University, Turkey
•LOEVENICH, DANIEL, Bundesamt für Sicherheit in der Informationstechnik (BSI), Germany
•LOSAVIO, MICHAEL, U. of Kentucky, USA
•LOTZ, VOLKMAR, SAP AG, France
•MAÑA, ANTONIO, University of Malaga, Spain
•MARTINELLI, FABIO, CNR-IIT, Italy
•MARTINEZ-PEREZ, GREGORIO, U. of Murcia, Spain
•MICHELE BEZZI, SAP, France
•NADARAJAM, R., PSG College of Technology, India
•POSEGGA, JOAQUM, U. of Passau, Germany
•PRESENZA, DOMENICO, Engineering, Italy
•QUISQUATER, JEAN-JACQUES, U. Catholique De Louvain, Belgium
•RAY, INDRAKSHI, Colorado State University, USA
•RUDOLPH, CARSTEN, Fraunhofer SIT, Germany
•SABETTA, ANTONINO, SAP, France
•SORIA-RODRIGUEZ, PEDRO, ATOS R&D, Spain
•SKIANIS CHARALABOS, University of Aegean, Greece
•SPANOUDAKIS, GEORGE, City University, UK
•WASHIZAKI, HIRONORI, Waseda University, Japan
•WESPI, ANDREAS, IBM, Switzerland
•YOSHIOKA, NOBUKAZU, Nat. I. of Informatics, Japan
•ZULKERNINE, MOHAMMAD,Queen’s U., Canada

20.05.2014 ANNUAL PRIVACY FORUM 2014
closing the loop from research to policy
Conference Dates: 
20.05.-21.05.2014
Location:  Athen
Link: 


Prof. Joachim Posegga from UNI PASSAU will attend the 2nd edition of Annual Privacy Forum will be jointly organized by the European Union Agency for Network and Information Security (ENISA), EC DG CONNECT and as local organizer the Systems Security Laboratory (SSL) of the University of Piraeus. The event will take place on 20thand 21st of May 2014 in Athens.<(p>

He will participate in the panel discussion on “Data Protection in the EU — risks and vulnerabilities, market and policy solution” taking place on the second day, 21st of May 2014, at 12:00. The panel discussion will discuss these risks and vulnerabilities. Furthermore, it explores market and policy solutions to the perceived lack of privacy and security of networks and devices. What is the role of research? What should companies do? standards? mandatory requirements?

RERUM sees security and in particular privacy as crucial for Europe and that it can be a competitive advantage. Hence, the technology should follow the principle of privacy by design, e.g. collecting data only if absolutely necessary. RERUM will exemplify this technical approach for the IoT.

16.04.2014 Oberseminar talk: Online Identity Theft
thesis presented by Wolfgang Frankenberger (supervised by Prof. Dr. J. Posegga and Bastian Braun)
Event Dates: 
16.04.2014 - 11:30
Location:  ITZ 010 (University of Passau)
Link: 

09.04.2014 Oberseminar talk: Structural Properties of Automata Circuits
presented by Eric Rothstein
Event Dates: 
09.04.2014 - 11:30
Location:  ITZ 010 (University of Passau)
Link: 

06.04.2014 IEEE WCNC 2014
Wireless Communications and Networking Conference
Conference Dates: 
06.04.-09.04.2014
Location:  Istanbul, Turkey
Link: 
W4. IoT Communications and Technologies

Program

09:00 - 10:30

Keynote: Henrich Pöhls (University of Passau, Germany)
Integrity -- A Short Tour around Technical and Legal Definitions and the Impact of Integrity

IoT Communications and Technologies I
Analysis of Radio Access Network Performance for M2M Communications in LTE-A at 800 MHz
Fatemah A. Alsewaidi (University of Bristol, UK), Dritan Kaleshi, Angela Doufexi (University of Bristol, UK)

Superframe Division Multi-hop Data Collection with Aggregation on Wi-SUN Profile for ECHONET Lite
Fumihide Kojima, Hiroshi Harada (NICT, Japan)

11:00 - 12:30

IoT Communications and Technologies II
RERUM: Building a Reliable IoT upon Privacy- and Security-enabled Smart Objects
Henrich Pöhls (University of Passau, Germany), Vangelis Angelakis (Linköping University, Sweden), Santiago Suppan, Kai Fischer (Siemens AG, Germany), George Oikonomou (University of Bristol, UK), Elias Tragos (Institute of Computer Science, FORTH, Greece), Rodrigo Diaz Rodriguez (Atos, Spain), Theodoros Mouroutis (Cyta Hellas, Greece)

Robust Online Music Identification using Spectral Entropy in the Compressed Domain
Changqing Yin (Tongji University, China), Wei Li (Fudan University, China), Yuanqing Luo (Tongji University, China), Li-Chuan Tseng (MediaTek Inc., Taiwan)

Fairness Evaluation of Scheduling Algorithms for Dense M2M Implementations
Sahibzada Ali Mahmud, Faizan Khan, Muhammad Ali, Gul Muhammad Khan, (University of Engineering and Technology Peshawar, Pakistan), Faqir Zarrar Yousaf (NEC Laboratories, Europe, Germany)

14:00 - 15:30

Keynote: Ali Zaidi (University of Leeds, UK)
Green IoT: Why Interference-aware Protocol Design is Critical?

IoT Services and Applications
Enabling IoT-empowered Smart Lighting Solutions: A Communication Theoretic Perspective
Syed Ali Raza Zaidi (University of Leeds, UK), Ali Imran (University of Oklahoma, USA), Desmond McLernon, Mounir Ghogho (University of Leeds, UK)

Deploying Parameters of Wireless Sensor Networks in Test Bed Environment
Fariborz Entezami, Christos Politis (Kingston University, UK)

16:00 – 17:30

Panel Discussion
IoT Communication and Technologies: Issues, Methods and Applications

Panelists:
• Mischa Dohler (King\'s College London, UK) – Panel Chair
• Jesus Alonso-Zarate (Centre Tecnològic de Télécomunicacions de Catalunya, Spain)
• Poehls, Henrich (University of Passau, Germany)

03.04.2014 Expertenworkshop IT-Sicherheit in Horizont 2020
Workshop Dates: 
03.04.2014
Location:  Köln
Link: 
Am 03.04.2014 findet in Köln ein Expertenworkshop zur Ausarbeitung nationaler Anforderungen aus Wissenschaft und Wirtschaft an die europäische IT-Sicherheitsforschung für das nächste Arbeitsprogramm 2016/17 in Horizont 2020 – das Rahmenprogramm für Forschung und Innovation der Europäischen Union – statt.

30.03.2014 6th International Conference on New Technologies, Mobility and Security
Conference Dates: 
30.03.-02.04.2014
Location:  Dubai
Link: 
Security TPC members

Habtamu Abie Norwegian Computing Center Norway
Claudio Ardagna Università degli Studi di Milano Italy
Carlo Blundo University of Salerno Italy
Jacek Cicho&#324; Wroclaw University of Technology Poland
Jorge Cuellar Siemens AG Germany
Roberto Di Pietro Università di Roma Tre Italy
Tassos Dimitriou Athens Information Technology Greece
Eduardo Fernandez Florida Atlantic University USA
Marcin Gogolewski Adam Mickiewicz University Poland
Dimitris Gritzalis Athens University of Economics and Business Greece
Sigrid Guergens Fraunhofer Institute for Secure Information Technology Germany
Farkhund Iqbal Zayed University UAE
Kevin Jones City University London United Kingdom
Jan Jürjens TU Dortmund & Fraunhofer ISST Germany
Stamatis Karnouskos SAP Germany
Sokratis Katsikas University of Piraeus Greece
Hristo Koshutanski University of Malaga Spain
Lukasz Krzywiecki Wroclaw University of Technology Poland
Bogdan Ksiezopolski Maria Curie-Sklodowska University Poland
Przemyslaw Kubiak Wroclaw University of Technology Poland
Costas Lambrinoudakis University of Piraeus Greece
Maryline Laurent Institut Mines-Télécom, Télécom SudParis France
Volkmar Lotz SAP AG France
Antonio Maña University of Malaga Spain
Andrew Marrington Zayed University UAE
Fabio Martinelli CNR-IIT Italy
Gregorio Martinez Perez University of Murcia Spain
Antonio Muñoz-Gallego University of Malaga Spain
David Naccache ENS France
Raphael Phan Loughborough University United Kingdom
Reinhard Posch TU Graz Austria
Joachim Posegga Institute of IT-Security and Security Law Germany
Jean-Jacques Quisquater Université Catholique De Louvain Belgium
Stefan Rass Alpen-Adria Universitaet Klagenfurt Austria
Carsten Rudolph Fraunhofer SIT Germany
Jose Fran. Ruiz Fraunhofer SIT Germany
Erkay Savas Sabanci University Turkey
Daniel Serrano Hanjin Shipping Spain
Jun Shao Zhejiang Gongshang University P.R. China
Harry Skianis University of the Aegean Greece
Nicolas Sklavos Technological Educational Institute of Western Greece Greece
Agusti Solanas Rovira i Virgili University Spain
Pedro Soria-Rodriguez Atos Spain
George Spanoudakis City University London United Kingdom
Said Huwida Zayed University UAE
Andreas Wespi IBM Zurich Research Laboratory Switzerland

03.03.2014 PhishSafe: Leveraging Modern JavaScript API’s for Transparent and Robust Protection @ CODASPY
Fourth ACM Conference on Data and Application Security and Privacy
Conference Dates: 
March 3-5, 2014
Location:  San Antonio, TX, USA
Link: 
With rapid global penetration of the Internet and smart phones and the
resulting productivity and social gains, the world is becoming
increasingly dependent on its cyber infrastructure. Criminals, spies and
predators of all kinds have learned to exploit this landscape much
quicker than defenders have advanced in their technologies. Security and
Privacy has become an essential concern of applications and systems
throughout their lifecycle. Security concerns have rapidly moved up the
software stack as the Internet and web have matured. The security,
privacy, functionality, cost and usability tradeoffs necessary in any
practical system can only be effectively achieved at the data and
application layers. This new conference provides a dedicated venue for
high-quality research in this arena, and seeks to foster a community
with this focus in cyber security.

03.03.2014 Oberseminar talk: Dynamic Taint Analysis of Native Code on Android - Using Taintdroid as a Case Study
thesis presented by Tobias Marktscheffel (supervised by Prof. Dr. J. Posegga and Daniel Schreckling)
Event Dates: 
03.03.2014 - 11:00
Location:  ITZ 010 (University of Passau)
Link: 

28.02.2014 On the Relation Between Redactable and Sanitizable Signature Schemes @ ESSOS 2014
ESSOS 2014 - International Symposium on Engineering Secure Software and Systems
Conference Dates: 
26. - 28. Feb. 2014
Location:  Munich
Link: 
Henrich C. Pöhls will present the results of the joint work with Hermann de Meer Joachim Posegga and Kai Samelin at ESSOS 2014.

We rigorously prove that RSSs are less expressive than SSSs: no unforgeable RSS can be transformed into an SSS. For the opposite direction we give a black-box transformation of a single SSS, with tightened security, into an RSS.
Redactable signatures (RSS) and sanitizable signatures (SSS) are among the most well studied cryptographic constructions of so called Malleable signature schemes (MSS).
Malleable signature schemes (MSS) enable a third party to alter signed data in a controlled way, maintaining a valid signature after an authorized change.
RSSs allow the removal of blocks from a signed document, while SSSs allow changing blocks to arbitrary strings.

This paper presents a method to transform a single instantiation of an SSS into an RSS. In detail, if we use one SSS instantiation, an emulation of an RSS can only be achieved, if the SSS’s security is strengthened, raising it above the existing standard. The resulting emulated RSS offers only weaker privacy guarantees. Moreover, we have argued rigorously that the opposite implication is not possible. Thus, no RSS can be transformed into an unforgeable SSS. Hence, RSSs and SSSs are indeed two different cryptographic building blocks, even if they achieve to define and delegate authorized modifications of signed messages. Currently, the number of SSSs achieving the new security requirements needed to securely emulate an RSS is still low.
For the future, we suggest to focus on implementing and standardizing an SSS secure enough to emulate RSSs, to have one universal building block. In the meantime we advice to use dedicated RSS algorithms if only redactions are needed and a SSS algortihm. Of course, you are advised to check current work to ensure the cryptographic strength of the constructions.

The goal of this symposium, which will be the sixth in the series, is to bring together researchers and practitioners to advance the states of the art and practice in secure software engineering. Being one of the few conference-level events dedicated to this topic, it explicitly aims to bridge the software engineering and security engineering communities, and promote cross-fertilization. The symposium will feature two days of technical program with keynote presentations by Ross Anderson, Adrian Perrig and Stephan Micklitz. In addition to academic papers, the symposium encourages submission of high-quality, informative industrial experience papers about successes and failures in security software engineering and the lessons learned. Furthermore, the symposium also accepts short idea papers that crisply describe a promising direction, approach, or insight.

26.02.2014 Redactable Signatures to Control the Maximum Noise for Differential Privacy in the Smart Grid @ SmartGridSec14
SmartGridSec14 - The Second Open EIT ICT Labs Workshop on Smart Grid Security
Workshop Dates: 
26. - 28. Feb. 2014
Location:  Munich
Link: 
Henrich C. Pöhls will present the results of his joint work with Markus Karwe on Redactable Signatures to Control the Maximum Noise for Differential Privacy in the Smart Grid.

The Smart Grid is currently developed and fundamental security requirements like integrity and origin authentication need to be addressed while minimising arising privacy issues. This paper balances the opposing goals: On one hand, we mitigate privacy issues raised by overly precise energy consumption values via data perturbation mechanisms, e.g., add noise. On the other hand the paper describes how to limit the noise’s range and keep a verifiable level of integrity of consumption values from the Smart Metering Gateway by facilitating a redactable signature.

The Second Open NESSoS / EIT ICT Labs Workshop on Smart Grid Security will take place in the Technical University of Munich, in the centre of the city, on the 26th of Feb, 2014 in the context of the International Symposium on Engineering Secure Software and Systems (ESSoS’14). The Workshop is sponsored jointly by the Network of Excellence on Engineering Secure Future Internet SW (NESSoS) and the action line smart energy systems of the EIT ICT Labs.

24.02.2014 Oberseminar talk: Redactable Signatures for Balance of Privacy and Integrity in the Smart Meter // Difference between Redactable and Sanitizable Signatures
presented by Henrich C. Pöhls
Event Dates: 
24.02.2014 - 11:00
Location:  ITZ 010 (University of Passau)
Link: 

10.02.2014 Oberseminar talk: Intermediate Talk
thesis presented by Tobias Friedl (supervised by Prof. Dr. J. Posegga and Bastian Braun)
Event Dates: 
10.02.2014 - 11:00
Location:  ITZ 010 (University of Passau)
Link: 

03.02.2014 Oberseminar talk: Design and implementation of a Trust and Reputation system for Cloud Foundry's cloud service
thesis presented by Daniel Nachtmann (supervised by Prof. Dr. J. Posegga and Daniel Schreckling)
Event Dates: 
03.02.2014 - 11:00
Location:  ITZ 010 (University of Passau)
Link: 

27.01.2014 Oberseminar talk: Design and Implementation of Integrated IaaS-Forensics for the Cloud
thesis presented by Julian Zach (supervised by Prof. Dr. H. Reiser)
Event Dates: 
27.01.2014 - 11:00
Location:  ITZ 010 (University of Passau)
Link: 

27.01.2014 Oberseminar talk: Online Identity Theft - Attacks and Countermeasures
thesis presented by Wolfgang Frankenberger (supervised by Prof. Dr. J. Posegga and Bastian Braun)
Event Dates: 
27.01.2014 - 11:00
Location:  ITZ 010 (University of Passau)
Link: 

6.12.2013 ESSOS 2014
International Symposium on Engineering Secure Software and Systems
Conference Dates: 
26.02.-28.02.2014
Location:  Munich
Link: 
Steering committee

Jorge Cuellar (Siemens AG)
Wouter Joosen (Katholieke Universiteit Leuven) - chair
Fabio Massacci (Università di Trento)
Gary McGraw (Cigital)
Bashar Nuseibeh (The Open University)
Daniel Wallach (Rice University University)



Organizing committee
General chair

Alexander Pretschner (Technische Universität Munich, DE)
Program co-chairs

Jan Jürjens (Fraunhofer, DE)

Frank Piessens (Katholieke Universiteit Leuven, BE)
eHealth workshop chair Wouter Joosen (Katholieke Universiteit Leuven)
Smart Grid workshop chair Jorge Cuellar (Siemens AG)
Publication chair Nataliia Bielova (INRIA Rennes, FR)
Publicity chair Pieter Philippaerts (Katholieke Universiteit Leuven, BE)
Local arrangements chair

Regina Jourdan (Technische Universität München, DE)
Web chair

Ghita Saevels (Katholieke Universiteit Leuven, BE)



Program committee

Ruth Breu, University of Innsbruck, Austria
Lorenzo Cavallaro, Royal Holloway University of London, UK
Anupam Datta, Carnegie Mellon University, US
Werner Dietl, University of Washington, US
François Dupressoir, IMDEA, Spain
Eduardo Fernandez, Florida Atlantic University, US
Eduardu Fernandez-Medina Paton, Universidad de Castilla-La Mancha, Spain
Cormac Flanagan, U. C. Santa Cruz, US
Dieter Gollmann, TU Hamburg-Harburg, Germany
Arjun Guha, Cornell University, US
Christian Hammer, Saarland University, Germany
Hannes Hartenstein, Karlsruher Institut für Technologie, Germany
Maritta Heisel, U. Duisburg Essen, Germany
Peter Herrmann, NTNU, Trondheim, Norway
Valerie Issarny, INRIA, France
Limin Jia, Carnegie Mellon University, US
Martin Johns, SAP Research, Germany
Jay Ligatti, University of South Florida, US
Heiko Mantel, TU Darmstadt, Germany
Haris Mouratidis, University of East London, UK
Martín Ochoa, Siemens AG, Germany
Jae Park, University of Texas at San Antonio, US
Erik Poll, RU Nijmegen, The Netherlands
Wolfgang Reif, University of Augsburg, Germany
Riccardo Scandariato, Katholieke Universiteit Leuven, Belgium
Ketil Stølen, SINTEF, Norway
Steve Zdancewic, University of Pennsylvania, US
Mohammad Zulkernine, Queens University, Canada

02.12.2013 Oberseminar talk: InTol-CA : An intrusion tolerant certificate authority based on secret sharing.
thesis presented by A. Rutabanadama (supervised by Prof. Dr. H. Reiser)
Event Dates: 
02.12.2013 - 11:00
Location:  ITZ 010 (University of Passau)
Link: 

26.11.2013 ANT 2014
The 5th International Conference on Ambient Systems, Networks and Technologies
Conference Dates: 
02.06.-05.06.2014
Deadline: 
04.01.2014
Location:  Hasselt, Belgium
Link: 
The 5th International Conference on Ambient Systems, Networks and Technologies (ANT-2014) is a leading international conference for researchers and industry practitioners to share their new ideas, original research results and practical development experiences from all Ambient Systems, Networks and Technologies related areas. The ANT-2014 will be held in conjunction with the International Conference on Sustainable Energy Information Technology (SEIT).

ANT 2014 will be held in the city of Hasselt. Hasselt was founded in approximately the 7th century on the Helbeek, a small tributary of the Demer river. The name Hasselt came from Hasaluth, which means hazel wood. During the Middle Ages, it became one of the bigger towns of the county of Loon, which had borders approximately the same as the current province of Limburg. Hasselt is an old yet modern city which is home to multiple academic institutions and where visitors can enjoy a variety of activities and entertainment.

ANT 2014 is co-organized & co-hosted by the Hasselt University, Belgium. Since 1973 Hasselt University is located on the Campus Diepenbeek, which occupies an attractive 150 acre site in the middle of Limburg\'s green belt. It is 2 kms west of the town centre of Diepenbeek, a residential town of 17.717 inhabitants, and 4 kms east of Hasselt which has a population of about 69.529 and is the administrative and commercial centre of the province. Brussels is 90 kms away (to the South-West), Antwerp lies 90 kms to the West, Liege (in the French-speaking part of Belgium) 45 kms to the South, Maastricht (in the Netherlands) 25 kms to the East, Aachen (in Germany) 60 kms to the South-East.

All ANT-2014 accepted papers will be printed in the conference proceedings published by Elsevier Science in the open-access Procedia Computer Science series on-line. Procedia Computer Sciences is hosted on www.Elsevier.com and on Elsevier content platform ScienceDirect (www.sciencedirect.com), and will be freely available worldwide. All papers in Procedia will also be indexed by Thomson Reuters\' Conference Proceeding Citation Index http://thomsonreuters.com/conference-proceedings-citation-index/. The papers will contain linked references, XML versions and citable DOI numbers. You will be able to provide a hyperlink to all delegates and direct your conference website visitors to your proceedings. All accepted papers will also be indexed in DBLP (http://dblp.uni-trier.de/).

18.11.2013 Oberseminar talk: An Interaction Computing Environment
presented by Eric Rothstein
Event Dates: 
18.11.2013 - 11:00
Location:  ITZ 010 (University of Passau)
Link: 

11.11.2013 Oberseminar talk: Parasitic HTML 5 : Helping the evil content provider
presented by Juan David Parra
Event Dates: 
11.11.2013 - 11:00
Location:  ITZ 010 (University of Passau)
Link: 

04.11.2013 Oberseminar talk: Sec. in Aeronautical Com. 2
presented by Arne Bilzhause
Event Dates: 
04.11.2013 - 11:00
Location:  ITZ 010 (University of Passau)
Link: 

28.10.2013 Oberseminar talk: Sec. in Aeronautical Com.
presented by Boutheyna Belgacem
Event Dates: 
28.10.2013 - 11:00
Location:  ITZ 010 (University of Passau)
Link: 

14.10.2013 Oberseminar talk: Operating system design and implementation from a security perspectiveOperating system design and implementation from a security perspective, [Marius Vlad]
presented by Oussama Mahjoub
Event Dates: 
14.10.2013 - 11:00
Location:  ITZ 010 (University of Passau)
Link: 

09.10.2013 Oberseminar talk: Protection of online polls against automated ballot stuffing
thesis presented by Tobias Friedl (supervised by Prof. Dr. J. Posegga and Bastian Braun)
Event Dates: 
09.10.2013 - 11:30
Location:  ITZ 010 (University of Passau)
Link: 

11.09.2013 Oberseminar talk: An Introduction to Algebraic Automata Theory
presented by Eric Rothstein
Event Dates: 
11.09.2013 - 11:30
Location:  ITZ 010 (University of Passau)
Link: 

26.08.2013 TRUSTBUS 2013
10TH INTERNATIONAL CONFERENCE ON TRUST, PRIVACY AND SECURITY IN DIGITAL BUSINESS
Conference Dates: 
26 - 30 August 2013
Location:  University of Economics, CZ Prague
Link: 
The advances in the Information and Communication Technologies (ICT) have raised new opportunities for the implementation of novel applications and the provision of high quality services over global networks. The aim is to utilize this ‘information society era’ for improving the quality of life for all citizens, disseminating knowledge, strengthening social cohesion, generating earnings and finally ensuring that organizations and public bodies remain competitive in the global electronic marketplace.


Unfortunately, such a rapid technological evolution cannot be problem free. Concerns are raised regarding the ‘lack of trust’ in electronic procedures and the extent to which ‘information security’ and ‘user privacy’ can be ensured.


In answer to these concerns, the 10th International Conference on Trust, Privacy and Security in Digital Business (TrustBus’13) will provide an international forum for researchers and practitioners to exchange information regarding advancements in the state of the art and practice of trust and privacy in digital business.


TrustBus’13 will bring together researchers from different disciplines, developers, and users all interested in the critical success factors of digital business systems. We are interested in papers, work-in-progress reports, and industrial experiences describing advances in all areas of digital business applications related to trust and privacy, including, but not limited to:

Anonymity and pseudonymity in business transactions
Delivery technologies and scheduling protocols
Economics of Information Systems Security
Enterprise management and consumer protection
Intellectual property and digital rights management
Languages for description of services and contracts
Models for access control and authentication
New cryptographic building-blocks for e-business applications
PKI & PMI
P2P transactions and scenarios
Reliability and security of content and data
Reputation in services provision
Security and Privacy models for Pervasive Information Systems
Shopping, trading, and contract management tools
Transactional Models
Usability of security technologies and services



Business architectures and underlying infrastructures
Common practice, legal and regulatory issues
Cryptographic protocols
Design of businesses models with security requirements
Electronic cash, wallets and pay-per-view systems
Identity and Trust Management
Intrusion detection and information filtering
Management of privacy & confidentiality
Multimedia web services
Online transaction processing
Public administration, governmental services
Real-time Internet E-Services
Reliable auction, e-procurement and negotiation technology
Secure process integration and management
Security Policies
Smartcard technology
Trust and privacy issues in mobile commerce environments


21.08.2013 Oberseminar talk: Service authorization with OAuth2
presented by Juan David Parra
Event Dates: 
21.08.2013 - 11:30
Location:  ITZ 010 (University of Passau)
Link: 

06.08.2013 Oberseminar talk: Developing an OS from Scratch
thesis presented by Eren Türkay (supervised by Prof. Dr. H. Reiser)
Event Dates: 
06.08.2013 - 11:30
Location:  ITZ 010 (University of Passau)
Link: 

29.07.2013 SECRYPT 2013
10TH INTERNATION CONFERENCE ON SECURITY AND CRYPTOGRAPHY
 Dates: 
29. - 31.July 2013
Location:  Reykjavik University, Menntavegur 1, IS 101 Reykjavik, Iceland
Link: 
SECRYPT is part of ICETE, the 10th International Joint Conference on e-Business and Telecommunications.
Registration to SECRYPT allows free access to all other ICETE conferences.

ICETE 2013 will be held in conjunction with DATA 2013, ICSOFT 2013 and SIMULTECH 2013.
Registration to ICETE allows free access to the DATA, ICSOFT and SIMULTECH conferences (as a non-speaker).

Upcoming Deadlines
Position Paper Submission: April 24, 2013
Regular Paper Authors Notification: May 6, 2013
Position Paper Authors Notification: May 16, 2013
Regular Paper Camera Ready and Registration: May 20, 2013
Position Paper Camera Ready and Registration: May 31, 2013

21.07.2013 HCII2013
Human Aspects of Information Security, Privacy and Trust
Conference Dates: 
21 - 26 July 2013
Deadline: 
12.10.2012
Location:  Las Vegas, Nevada, USA
Link: 
Indicative topics/keywords of the broad spectrum of issues to be addressed:
Fine balancing between user friendliness and strong security
Human behaviour in security and privacy
Secure and trustworthy ambient intelligence
Security and privacy in social networking
Security policies and user behaviour
Trustworthy biometric security
Trustworthy life-logging
Usable authentication mechanisms
User centric and trustworthy Future Internet
User centric security and privacy
User centric security and privacy in the cloud
User psychology and social influence in security and privacy decisions
User Security and Privacy by design

Program Chairs:

Louis Marinos, ENISA EU
Ioannis Askoxylakis, Greece

Board Members:

Claudio Agostino Ardagna, Italy
Zinaida Benenson, Germany
Marc Dacier, France
Cagatay Karabat, Turkey
Angelos Keromytis, United States
Javier Lopez, Spain
Emilio Mordini, EU
Aljosa Pasic, Spain
Milan Petkovi&#263;, The Netherlands
Joachim Posegga, Germany
Jean-Jacques Quisquater, Belgium
Damien Sauveron, France
George Spanoudakis, United Kingdom
Theo Tryfonas, United Kingdom
João Vilela, Portugal
Claire Vishik, United Kingdom

17.07.2013 Oberseminar talk: Defintions of Digital Signatures and Integrity, revisited
presented by Henrich C. Pöhls
Event Dates: 
17.07.2013 - 11:30
Location:  ITZ 010 (University of Passau)
Link: 

10.07.2013 Oberseminar talk: The Algebra of Enforceable Policies
presented by Eric Rothstein
Event Dates: 
10.07.2013 - 11:30
Location:  ITZ 010 (University of Passau)
Link: 

03.07.2013 Oberseminar talk: Variability-aware Data-flow Analysis for Smartphone Applications
thesis presented by Daniel Hausknecht (supervised by Prof. Dr. J. Posegga and Daniel Schreckling)
Event Dates: 
03.07.2013 - 11:30
Location:  ITZ 010 (University of Passau)
Link: 

26.06.2013 Oberseminar talk: Privacy Aware Android Bytecode Rewriting
thesis presented by Bernhard Bermeitinger (supervised by Prof. Dr. J. Posegga and Daniel Schreckling)
Event Dates: 
26.06.2013 - 11:30
Location:  ITZ 010 (University of Passau)
Link: 

26.06.2013 Oberseminar talk: OpenID Security
thesis presented by Christoph Oblinger (supervised by Prof. Dr. J. Posegga and Bastian Braun)
Event Dates: 
26.06.2013 - 11:30
Location:  ITZ 010 (University of Passau)
Link: 

19.06.2013 Oberseminar talk: Rehearsal for the colloquium talk
presented by Bastian Braun
Event Dates: 
19.06.2013 - 11:30
Location:  ITZ 010 (University of Passau)
Link: 

03.06.2013 Talk @ IFIPTM 2013: Contingency Revisited: Secure Construction and Legal Implications of Verifiably Weak Integrity
H. C. Pöhls
Conference Dates: 
03.-07. June 2013
Location:  Malaga, Spain
Link: 
Contingency Revisited: Secure Construction and
Legal Implications of Veri ably Weak Integrity

by H. C. Pöhls

Digital signatures are by far the most prominent mechanisms
to detect violations of integrity. When signing rights are delegated, the
integrity protection is gradually weaker as the delegatee\'s actions are not
considered integrity violations. Taken to an extreme, delegating the right
to undetectably change everything to everyone will achieve a property
called contingency. Contingency was introduced as the \"dual of integrity\"
in 2009 by Rost and P tzmann in German and later translated
into English in 2011. Contingency describes the exact opposite of
integrity: the provable absence of integrity. Following this line of privacy
research, this paper gives the rst rigorous de nition of contingency and
presents a cryptographic protocol build upon a transparent sanitizable
signature scheme. Hence, contingency is a veri able statement that the
signer explicitly desired that the integrity status of data is not veri able.
We analyze legal implications and applications of contingent information.

03.06.2013 IFIPTM 2013
7th IFIP WG 11.11 International Conference on Trust Management
Conference Dates: 
03.-07. June 2013
Location:  Malaga, Spain
Link: 
IFIPTM 2013 invites submissions presenting novel research on all topics related to Trust, Security and Privacy, including but not limited to:

Trust in Information Technology
- formal aspects (specification, reasoning, and analysis)
- trust-based and trust-aware IT policy management
- trust in social networks and emerging contexts
- trust in collaborative applications, crowd-sourcing and wiki systems
- trust in human-computer interaction and usable systems
- case studies and applications

Socio-Technical, economic and sociological Trust
- economic modeling of trust, risk and control; economics of trusted data quality
- trust, control and reputation effects in social networking, e- and m-commerce
- trust and socio materiality; socio-technical action network structures; biological trust
- ethical, sociological, psychological, legal aspects

Trust and reputation management systems
- architectures and models
- metrics and computation
- applications

Identity management and trust
- anonymity, privacy and accountability
- identity and personal information brokering
- legal aspects

Secure, trustworthy and privacy-aware systems
- platforms and standards
- software and services
- applications

Trust building in Large scale systems
- trust in Cloud environments
- large Identity Management Systems like UID/SSN, Banks, Mobile user groups
- trust management for large user groups including machine and human participation


As previous editions, papers will be published by Springer under AICT series.

29.05.2013 Oberseminar talk: Titel folgt
thesis presented by Tobias Zillner (supervised by Prof. Dr. H. Reiser)
Event Dates: 
29.05.2013 - 11:30
Location:  ITZ 010 (University of Passau)
Link: 

28.05.2013 WISTP 2013: Workshop in Information Security Theory and Practice
Securing Mobile and Cyber-physical Systems
Conference Dates: 
28.-30. May 2013
Location:  Heraklion, Crete, Greece
Link: 
Workshop Background and Goals

Current developments in IT are characterized by an increasing use of personal mobile devices and an increasing reliance on IT for supporting industrial applications in the physical world. A new persepctive on socio-technical and cyber-physical systems is required that sees in IT more than just an infrastructure but focuses on the ever closer integration between social and technical processes.

App markets, such as Google Play and Apple App Store drive a mobile ecosystem, offering interesting profitable business models with high turnovers and new opportunities, which however have also attract cybercriminals and raise new privacy concerns.

In the area of cyber-physical system, research has to go beyond securing the IT infrastructure and consider attacks launched by combining manipulations in physical space and cyber space.

The workshop seeks submissions from academia and industry presenting novel research on all aspects of security and privacy of mobile devices (specifically Android and iOS platforms), as well as studies on securing cyber-physical systems.

Topics
Topics of interest include, but are not limited to:



* Vulnerability detection

* Application security

* Usability

* Privacy

* Mobile malware

* Mobile OSes security analysis

* Cloud-enhanced mobile security

* BYOD contexts


General Chairs



* Ioannis G. Askoxylakis. FORTH-ICS, Greece

* Louis Marinos, ENISA, EU



Local Organizers



* Nikolaos Petroulakis, FORTH-ICS, Greece


Workshop, Panel, Tutorial Chair



* Damien Sauveron, XLIM, University of Limoges, France



Publicity Chairs


* Claudio Ardagna, Universita` degli Studi di Milano, Italy

* Mauro Conti, University of Padua, Italy



Program co-Chair



* Lorenzo Cavallaro, Royal Holloway University of London, UK

* Dieter Gollmann, Hamburg University of Technology, Germany



Program Committee



* Raja Naeem Akram, Edinburgh Napier University, UK

* Claudio Ardagna, Universita` degli Studi di Milano, Italy

* Ioannis G. Askoxylakis. FORTH-ICS, Greece

* Lejla Batina, Radboud University Nijmegen, The Netherlands

* Danilo Bruschi, University degli Studi di Milano, Italy

* Mauro Conti, University of Padua, Italy

* Marco Cova, University of Birmingham, UK

* Manuel Egele, Carnegie Mellon University, USA

* Jaap-Henk Hoepman, Radboud University Nijmegen, The Netherlands

* Andrea Lanzi, Insitut Eurecom, France

* Corrado Leita, Symantec Research Europe, EU

* Federico Maggi, Politecnico di Milano, Italy

* Evangelos Markatos, FORTH-ICS, Greece

* Lorenzo Martignoni, Google Inc., Switzerland

* Sjouke Mauw, University of Luxembourg, Luxembourg

* Aikaterini Mitrokotsa, EPFL, Switzerland

* Igor Muttik, McAfee Labs, UK

* Flemming Nielson, Danish Technical University, Danmark

* Wolter Pieters, TU Delft, The Netherlands

* Christina Pöpper, ETH Zürich, Switzerland

* Joachim Posegga, Institute of IT-Security and Security Law, Germany

* Jean-Jacques Quisquater, DICE, Catholic University of Louvain, Belgium

* William Robertson, Northeastern University, USA

* Pierangela Samarati, Universita` degli Studi di Milano, Italy

* Asia Slowinska, Vrije Universiteit Amsterdam, The Netherlands

* Stefano Zanero, Politecnico di Milan, Italy

* Jianying Zhou, Institute for Infocomm Research, Singapore



Steering Committee


* Ioannis G. Askoxylakis. FORTH-ICS, Greece

* Angelos Bilas, FORTH-ICS & University of Crete, Greece

* Konstantinos Markantonakis, ISG-SCC, Royal Holloway University of London, UK

* Joachim Posegga, Institute of IT-Security and Security Law, Germany

* Jean-Jacques Quisquater, DICE, Catholic University of Louvain, Belgium

* Damien Sauveron, XLIM, University of Limoges, France

28.05.2013 Talk @ WISTP 2013: Malleable Signatures for Resource Constrained Platforms
H. C. Pöhls, S. Peters, K. Samelin, J. Posegga and H. de Meer
Conference Dates: 
28.-30. May 2013
Location:  Heraklion, Crete
Link: 
Malleable Signatures for Resource Constrained Platforms
by H. C. Pöhls, S. Peters, K. Samelin, J. Posegga and H. de Meer.


Malleable signatures allow the signer to control alterations to
a signed document. The signer limits alterations to certain parties and to
certain parts de ned during signature generation. Admissible alterations
do not invalidate the signature and do not involve the signer. These
properties make them a versatile tool for several application domains,
like e-business and health care. We implemented one secure redactable
and three secure sanitizable signature schemes on secure, but computa-
tionally bounded, smart card. This allows for a secure and practically
usable key management and meets legal standards of EU legislation. To
gain speed we securely divided the computing tasks between the powerful
host and the card; and we devise a new accumulator to yield a useable
redactable scheme. The performance analysis of the four schemes shows
only a small performance hit by the use of an o -the-shelf card.

22.05.2013 Oberseminar talk: Contingency Revisited and Lessons Learned from Implementing Malleable Signatures on Smart Cards
presented by Henrich C. Pöhls
Event Dates: 
22.05.2013 - 11:30
Location:  ITZ 010 (University of Passau)
Link: 

15.05.2013 Oberseminar talk: Final Presentation of his Bachelor Thesis
thesis presented by Benedikt Petschkuhn (supervised by Prof. Dr. J. Posegga and Bastian Braun)
Event Dates: 
15.05.2013 - 11:30
Location:  ITZ 010 (University of Passau)
Link: 

15.05.2013 Oberseminar talk: Bachelor Thesis
thesis presented by Christian v. Pollak (supervised by Prof. Dr. J. Posegga and Bastian Braun)
Event Dates: 
15.05.2013 - 11:30
Location:  ITZ 010 (University of Passau)
Link: 

08.05.2013 Oberseminar talk: 1st talk on his Master Thesis
thesis presented by Johannes Köstler (supervised by Prof. Dr. J. Posegga and Bastian Braun)
Event Dates: 
08.05.2013 - 11:30
Location:  ITZ 010 (University of Passau)
Link: 

08.05.2013 Oberseminar talk: Titel folgt
thesis presented by Michael Beham (supervised by Prof. Dr. H. Reiser)
Event Dates: 
08.05.2013 - 11:30
Location:  ITZ 010 (University of Passau)
Link: 

24.04.2013 Oberseminar talk: My PhD - A True Story
presented by Bastian Braun
Event Dates: 
24.04.2013 - 11:30
Location:  ITZ 010 (University of Passau)
Link: 

09.04.2013 Oberseminar talk: Marius Vlad
presented by Prof. Dr. H. Reiser
Event Dates: 
09.04.2013 - 11:30
Location:  ITZ 010 (University of Passau)
Link: 

26.03.2013 Oberseminar talk: Policy-Driven Automatic Application of Malleable Signature - Exemplified by Minimal-Inversive Data Leakage Prevention at the WebService Proxy
thesis presented by Arne Bilzhause (supervised by Prof. Dr. J. Posegga and Henrich C. Pöhls)
Event Dates: 
26.03.2013 - 11:30
Location:  ITZ 010 (University of Passau)
Link: 

19.03.2013 Oberseminar talk: Enforceable Control Flow Integrity Policies
presented by Eric Rothstein
Event Dates: 
19.03.2013 - 11:30
Location:  ITZ 010 (University of Passau)
Link: 

12.03.2013 Oberseminar talk: Parasitic computing and HTML5
presented by Juan David Parra
Event Dates: 
12.03.2013 - 11:30
Location:  ITZ 010 (University of Passau)
Link: 

05.03.2013 Oberseminar talk: On the legal assessment of the evidence of sanitizably signed documents
presented by Henrich C. Pöhls
Event Dates: 
05.03.2013 - 11:30
Location:  ITZ 010 (University of Passau)
Link: 

19.02.2013 Oberseminar talk: tba
thesis presented by Simon Pohlert (supervised by Prof. Dr. H. Reiser)
Event Dates: 
19.02.2013 - 11:30
Location:  ITZ 010 (University of Passau)
Link: 

12.02.2013 Oberseminar talk: 1st Talk on Policy-Driven Automatic Application of Malleable Signature - Exemplified by Minimal-Inversive Data Leakage Prevention at the WebService Proxy
thesis presented by Arne Bilzhause (supervised by Prof. Dr. J. Posegga and Henrich C. Pöhls)
Event Dates: 
12.02.2013 - 11:30
Location:  ITZ 010 (University of Passau)
Link: 

21.01.2013 Oberseminar talk: Preparation talk
presented by Daniel Schreckling
Event Dates: 
21.01.2013 - 14:00
Location:  ITZ 010 (University of Passau)
Link: 

15.01.2013 Oberseminar talk: tba
thesis presented by Korbinian Pauli (supervised by Prof. Dr. J. Posegga and Bastian Braun)
Event Dates: 
15.01.2013 - 11:30
Location:  ITZ 010 (University of Passau)
Link: 

08.01.2013 Oberseminar talk: The two different concepts of SSS and RSS and their properties.
presented by Henrich C. Pöhls
Event Dates: 
08.01.2013 - 11:30
Location:  ITZ 010 (University of Passau)
Link: 

18.12.2012 Oberseminar talk: WebLan: WebSand's Policy Language
presented by Eric Rothstein
Event Dates: 
18.12.2012 - 11:30
Location:  ITZ 010 (University of Passau)
Link: 

04.12.2012 Oberseminar talk: Abstract State Machines and Meta-Policies: can they be defined?
presented by Eric Rothstein
Event Dates: 
04.12.2012 - 11:30
Location:  ITZ 010 (University of Passau)
Link: 

27.11.2012 Oberseminar talk: tba
thesis presented by Michael Beham (supervised by Prof. Dr. H. Reiser)
Event Dates: 
27.11.2012 - 11:30
Location:  ITZ 010 (University of Passau)
Link: 

20.11.2012 Oberseminar talk: Definitions of Integrity and Authorized Changes in the light of the Value of Evidence.
presented by Henrich C. Pöhls
Event Dates: 
20.11.2012 - 11:30
Location:  ITZ 010 (University of Passau)
Link: 

14.11.2012 Oberseminar talk: The extension interface of Mozilla Firefox and Google Chrome
thesis presented by Johannes Rückert (supervised by Prof. Dr. J. Posegga and Bastian Braun)
Event Dates: 
14.11.2012 - 11:30
Location:  ITZ 010 (University of Passau)
Link: 

06.11.2012 Oberseminar talk: Performance of Sanitizable Signatures on Smart Cards
thesis presented by S. Peters (supervised by Prof. Dr. J. Posegga and Henrich C. Pöhls)
Event Dates: 
06.11.2012 - 11:30
Location:  ITZ 010 (University of Passau)
Link: 

02.11.2012 SPACE 2012
International Conference on Security, Privacy and Applied Cryptography Engineering
 Dates: 
02 - 03 November 2012
Deadline: 
08.06.2012
Location:  Indian Institute of Technology MAdras, Chennai, India
Link: 
Hon. General Chairs :

C. Pandurangan, IIT Madras, India

General Chairs :

Sanjay Burman, CAIR, Bangalore and
V. Kamakoti, Dept of Computer Science and Engineering, IIT Madras, Chennai

Organizing Chair :

S. Balachandran, Dept of Computer Science and Engineering, IIT Madras, Chennai.

PC Chairs :

Andrey Bogdanov, KU Leuven
Somitra Sanadhya, IIIT Delhi

17.10.2012 Oberseminar talk: Netzwerksimulation zur Verbesserung von Malware-Analyse
thesis presented by Thomas Penteker (supervised by Prof. Dr. H. Reiser)
Event Dates: 
17.10.2012 - 11:30
Location:  ITZ 010 (University of Passau)
Link: 

17.10.2012 Oberseminar talk: Design and Implementation of a Security Architecture for BFT Group Communication
thesis presented by Benedikt Höfling (supervised by Prof. Dr. H. Reiser)
Event Dates: 
17.10.2012 - 11:30
Location:  ITZ 010 (University of Passau)
Link: 

15.10.2012 Oberseminar talk: WebSand - Y2 Review Rehearsal
presented by Bastian Braun
Event Dates: 
15.10.2012 - 14:00
Location:  ITZ 010 (University of Passau)
Link: 

10.10.2012 Oberseminar talk: Integration of Authorized Bytecode Modifications in Android
thesis presented by C. Hillmann (supervised by Prof. Dr. J. Posegga and Daniel Schreckling)
Event Dates: 
10.10.2012 - 11:30
Location:  ITZ 010 (University of Passau)
Link: 

10.10.2012 CRiSIS 2012
7th International Conference on Risks and Security of Internet and Systems
Conference Dates: 
10 - 12 October 2012
Deadline: 
20.05.2012
Location:  Cork - Ireland
Link: 
The International Conference on Risks and Security of Internet and Systems 2012 is the seventh in a series dedicated to security challenges related to Internet applications, networks and systems. In recent years, the Internet has become essential for the exchange of information between user groups and organizations from different backgrounds and with different needs and objectives. These users are exposed to increasing security and privacy risks, due to the development increasingly sophisticated online attacks, the growth of Cybercrime, etc. Contemporary attackers are motivated and are increasingly experienced. To compound matters, sophisticated tools that facilitate attacks are readily available. Moreover, the increasing complexity and the vulnerabilities in newer technologies such as pervasive, mobile and wireless devices and networks, raise new security challenges.

In this context, new security mechanisms and techniques are needed to achieve an acceptable level of assurance for critical domains such as transportation, health, defence, banking, critical infrastructures, embedded systems and networks and avionics systems. The CRiSIS conference offers an effective forum for computer and network security researchers from industry, academia and government to meet, exchange ideas and present recent advances

24.09.2012 Oberseminar talk: Design and implementation of a secure and adaptive storage layer across several cloud providers
thesis presented by B. D'Oleire-Oltmans (supervised by Prof. Dr. H. Reiser)
Event Dates: 
24.09.2012 - 16:00
Location:  ITZ 010 (University of Passau)
Link: 

24.09.2012 Oberseminar talk: Cross Device Usage Control for Confidential Data in Android (final talk)
thesis presented by S. Kremer (supervised by Prof. Dr. J. Posegga and Daniel Schreckling)
Event Dates: 
24.09.2012 - 16:00
Location:  ITZ 010 (University of Passau)
Link: 

19.09.2012 ISC 2012
Information Security Conference
Conference Dates: 
19. - 21. September 2012
Location:  University of Passau, Innstr. 31, Audimax, 94032 Passau
Link: 
General Chair
Joachim Posegga (ISL, University of Passau)

Program Chair
Dieter Gollmann (Hamburg University of Technology)

Program co-Chair
Felix Freiling (FAU Erlangen-Nürnberg)

Publicity Chair
Isaac Agudo (University of Malaga)
Cheng-Kang Chu (National Chiao Tung University)

Steering Committee Chair
Masahiro Mambo (Kanazawa University)

The Information Security Conference (ISC) is an annual international conference covering research in theory and applications of Information Security. ISC aims to attract high quality papers in all technical aspects of information security. It was first initiated as a workshop in Japan in 1997 (ISW\'97, LNCS 1396), ISW 1999 in Malaysia (LNCS 1729), ISW 2000 in Australia (LNCS 1975) and then changed to the current name ISC when it was held in Spain in 2001 (ISC\'01, LNCS 2200). The latest conferences were held in Brazil (ISC\'02, LNCS 2433), UK (ISC\'03, LNCS 2851), USA (ISC\'04, LNCS 3225), Singapore (ISC\'05, LNCS 3650), Greece (ISC\'06, LNCS 4176), and Chile (ISC\'07, LNCS 4779), Chinese Taipei(ISC\'08, LNCS 5222), Italy (ISC\'09, LNCS 5735), USA (ISC’10), and China (ISC\'11).

17.09.2012 Oberseminar talk: Model Checking of Android Applications to derive strongest preconditions for secure data flows
thesis presented by S. Rasthofer (supervised by Prof. Dr. J. Posegga and Daniel Schreckling)
Event Dates: 
17.09.2012 - 16:00
Location:  ITZ 010 (University of Passau)
Link: 

17.09.2012 Oberseminar talk: Proof carrying Android applications
thesis presented by R. Wimmer (supervised by Prof. Dr. J. Posegga and Daniel Schreckling)
Event Dates: 
17.09.2012 - 16:00
Location:  ITZ 010 (University of Passau)
Link: 

17.09.2012 Oberseminar talk: Sanitizable Signatures on Smart Cards
thesis presented by S. Peters (supervised by Prof. Dr. J. Posegga and Henrich C. Pöhls)
Event Dates: 
17.09.2012 - 16:00
Location:  ITZ 010 (University of Passau)
Link: 

13.09.2012 EuroPKI 2012
9th European PKI Workshop: Research and Applications.
Conference Dates: 
September 13-14, 2012
Location:  Pisa, Italy
Link: 

12.09.2012 Oberseminar talk: URANOS
presented by Stephan Huber
Event Dates: 
12.09.2012 - 11:30
Location:  ITZ 010 (University of Passau)
Link: 

22.08.2012 Oberseminar talk: A User-level Authentication Scheme to Mitigate Web Session-Based Vulnerabilities
presented by Bastian Braun
Event Dates: 
22.08.2012 - 11:30
Location:  ITZ 010 (University of Passau)
Link: 

08.08.2012 Oberseminar talk: Recent Approaches in Web Security Research
presented by Bastian Braun
Event Dates: 
08.08.2012 - 11:30
Location:  ITZ 010 (University of Passau)
Link: 

06.08.2012 Master-Zwischenvortrag von Benedikt Höfling
Design and Implementation of a Security Architecture for BFT Group Communication
Event Dates: 
06.08.2012
Location:  ITZ 010 - 16.00 Uhr
Link: 
Several research projects have shown that Byzantine fault tolerance
(BFT) is practical today in terms of performance. Deficiencies in other
aspects might still be an obstacle to a more wide-spread deployment in
real-world applications. One of these aspects is an over-all security
architecture beyond the low-level protocol. This thesis proposes the
security architecture SecureSMART, which provides dynamic key
distribution, internal and external integrity and confidentiality
measures, as well as mechanisms for availability and access control. For
this purpose, it implements security mechanism between clients, nodes
and an external trust center.

01.08.2012 Oberseminar talk: WebSand: Unwinding and Non-Interference
presented by Eric Rothstein
Event Dates: 
01.08.2012 - 11:30
Location:  ITZ 010 (University of Passau)
Link: 

27.07.2012 Caspar Gries
Zwischenvortrag Masterarbeit
Event Dates: 
27.07.2012
Location:  10.00 Uhr - ITZ 010
Link: 

25.07.2012 Mastervortrag von Tobias Zillner
Memory Forensics using Virtual Machine Introspection for Cloud Computing
Event Dates: 
25.07.2012
Location:  ITZ 010 - 12.00 Uhr
Link: 


With the development of cloud computing a new field for forensic challenges rises. Cloudusers have a very limited access to forensic data. This means a loss of information and control for customers. In most cases cloud service providers offer very restricted interfaces or services for forensic issues. Also logs and other metadata are often not available.
Aim of the work is the development of a concept, which gives cloudusers a possibility to collect and analyze relevant forensic data. Focus lies on live analysis of memory without pausing the virtual machine. This is realized via virtual machine introspection. Furthermore a proof of concept implementation of the designed architecture is developed. As example usecase sensitive cryptographic key material should be extracted.

25.07.2012 Mastervortrag - Tobias Gebhardt
Network forensics for cloud computing
Event Dates: 
25.07.2012
Location:  ITZ 010 - 11.30 Uhr
Link: 
Network forensics for cloud computing

Abstract:

The aim of this talk is to present the main goals about network forensics in an

Infrastructure-as-a-Service environment. Differences between forensics and forensics in a virtualized environment

will be discussed in this topic. Therefore a prototype of a network forensics service is shown.

The Service is implemented as a part of an IaaS Model and is usable by the cloud users.

In the backend OpenNebula (opennebula.org) is extended through a forensics API while

Xplico (xplico.org) is used for the forensics analysis service.

25.07.2012 Oberseminar talk: Network forensics for cloud computing
thesis presented by T. Gebhardt (supervised by Prof. Dr. H. Reiser)
Event Dates: 
25.07.2012 - 11:30
Location:  ITZ 010 (University of Passau)
Link: 

25.07.2012 Oberseminar talk: Memory Forensics using Virtual Machine Introspection for Cloud Computing
thesis presented by T. Zillner (supervised by Prof. Dr. H. Reiser)
Event Dates: 
25.07.2012 - 11:30
Location:  ITZ 010 (University of Passau)
Link: 

24.07.2012 SECRYPT 2012
9th International Conference on Security and Cryptography
Conference Dates: 
24 - 27 July 2012
Deadline: 
05.03.2012
Location:  Rome, Italy
Link: 
SECRYPT is an annual international conference covering research in information and communication security. The 9th International Conference on Security and Cryptography (SECRYPT 2012) will be held in Rome, Italy. The conference seeks submissions from academia, industry, and government presenting novel research on all theoretical and practical aspects of data protection, privacy, security, and cryptography. Papers describing the application of security technology, the implementation of systems, and lessons learned are also encouraged.

IMPORTANT DATES
Full Paper submission: March 5, 2012
Authors Notification (full papers): May 4, 2012
Final Full Paper Submission and Registration: May 14, 2012

CONFERENCE CHAIR
Mohammad S. Obaidat, Monmouth University, U.S.A.

PROGRAM CHAIR
Pierangela Samarati, Universita\\\' degli Studi di Milano, Italy

PROGRAM CO-CHAIRS
Wenjing Lou, Virginia Polytechnic Institute and State University, United States
Jianying Zhou, Institute For Infocomm Research, Singapore

24.07.2012 SECRYPT 2012
International Conference on Security and Cryptography
Conference Dates: 
24 - 27 July, 2012
Location:  Rome, Italy
Link: 
We presented our paper on

Flexible Redactable Signature Schemes for Trees --- Extended Security Model and Construction

by H. C. Pöhls, K. Samelin, J. Posegga and H. de Meer

18.07.2012 Oberseminar talk: Signer Control over Flexible Redactable Signature Schemes for Trees
presented by Henrich C. Pöhls
Event Dates: 
18.07.2012 - 11:30
Location:  ITZ 010 (University of Passau)
Link: 

17.07.2012 Deduktive Verifikation von Informationsflußeigenschaften in Java
Kolloquiumsvortrag von Prof. Dr. P. H. Schmitt, Karlsruher Institut für Technologie (KIT) Institut für Theoretische
Event Dates: 
17.07.2012 - 18.00 Uhr
Location:  IM HS 13
Link: 

Die Präsentation beginnt mit einer kurzen Einführung in die
deduktive Programmverifikation. Ausgangspunkt der Verifikation ist dabei
der mit Annotationen in der Spezifikationssprache JML (Java Modelling
Language) angereicherte Java Quellcode. Daraus werden automatisch
Beweisverpflichtungen in einer Programmlogik erzeugt, in unserem Fall in
einer Instanz der Dynamischen Logik.
Als konkretes Beispiel dient das KeY Verifikationssystem.
Im Hauptteil des Vortrag wird eine der gängigsten Definitionen eines
\"Informationslecks\" betrachtet und ihre Formalisierung in Dynamischer Logik
vorgestellt. Die letzten Endes benutze Formalisierung ist unter der
Bezeichnung \"Selbstkomposition\" bekannt geworden. Es wird gezeigt wie
\"Selbstkomposition\" im KeY System realisiert werden kann. Die Vorführung eines
kleinen Beispiels beschließt den Vortrag.









Deductive Verification of Information Flow Properties in Java

The presentation starts with a short introduction into deductive program
verification. This verification needs as input Java source code annotated with
JML (Java Modelling Language) specifications. From these proof obligations
in a program logic will automatically be generated, in our case proof
obligations in an instance of Dynamic Logic.
The KeY verification systems serves as a guiding example.
In the main part of the talk we will consider information leakage as one
of the most frequent information flow properties and discuss its
formalisation in Dynamic Logic. The solution finally adopted is usually
referred top as \"self-composition\". It is shown how \"self-composition\" can be
realized in the KeY system. A small example concludes the presentation.


11.07.2012 Oberseminar talk: Project ICONAV
presented by Stephan Huber
Event Dates: 
11.07.2012 - 11:30
Location:  ITZ 010 (University of Passau)
Link: 

04.07.2012 Oberseminar talk: Legal applicability of sanitizable and redactable signatures
presented by Henrich C. Pöhls
Event Dates: 
04.07.2012 - 11:30
Location:  ITZ 010 (University of Passau)
Link: 

02.07.2012 Client-Side Encryption and Dynamic Group Management for a Secure Network Storage Service
Abschlussvortrag - Masterarbeit von Fabian Förg
Event Dates: 
02.07.2012
Location:  ITZ 010 ab 16.00 Uhr
Link: 
Abstract:
Network storage providers are usually untrusted.
Even if a provider encrypts the files on behalf of its users, data confidentiality is at stake, as the secrets which were used to encrypt the files are in the provider\'s hands.
To overcome this issue, we devise a network storage system which encrypts files on the client-side.
Moreover, our system offers the ability to share files within groups.
Since group membership can be dynamic, we propose a key management scheme for secure file sharing in dynamic groups.
Furthermore, this thesis presents protocols and algorithms which enable file versioning as well as synchronization.
Finally, we provide a fully-functional prototype implementation of our secure network storage service.
The implementation has proved to be performant in our test environment.

27.06.2012 Oberseminar talk: My Road to PhD
presented by Bastian Braun
Event Dates: 
27.06.2012 - 11:30
Location:  ITZ 010 (University of Passau)
Link: 

18.06.2012 Oberseminar talk: A Proof-carrying Code approach to improve the validation of Android apps for data-centric user policy compliance
thesis presented by S. Rasthofer and R.Wimmer (supervised by Prof. Dr. J. Posegga and Daniel Schreckling)
Event Dates: 
18.06.2012 - 16:00
Location:  ITZ 010 (University of Passau)
Link: 

30.05.2012 Oberseminar talk: Cross Device Usage Control for Confidential Data in Android
thesis presented by S. Kremer (supervised by Prof. Dr. J. Posegga and Daniel Schreckling)
Event Dates: 
30.05.2012 - 11:30
Location:  ITZ 010 (University of Passau)
Link: 

23.05.2012 Oberseminar talk: Client-Side Encryption and Dynamic Group Management for a Secure Network Storage Service
thesis presented by F. Förg (supervised by Prof. Dr. H. Reiser)
Event Dates: 
23.05.2012 - 11:30
Location:  ITZ 010 (University of Passau)
Link: 

08.05.2012 5th MPICC Interdisciplinary Conference
An interdisciplinary conference in Freiburg i. Br
Conference Dates: 
08 - 10 May 2012
Location:  Freiburg i. Br.
Link: 
Scope of conference

The purpose of the workshops and of the conference is to bring together researchers and practitioners from various disciplines. IT professionals, lawyers, law enforcement and intelligence agents, as well as judges, prosecutors, forensic specialists and psychologists will contribute their special expertise to the discussion of current security issues, covering topics like anonymity vs. accountability, cybercrime, computer forensics and investigations, legal aspects on current security and privacy issues, resilience in communication infrastructures, human-related security risks, a broad range of privacy matters and traditional IT and network security. The debate on the radical changes in the risk, threat and vulnerability of IT systems condense on this workshop jointly organized by the Max Planck Institute for Foreign and International Criminal Law (MPICC) and the Centre for Security and Society at the University of Freiburg. The aim of this interdisciplinary conference is to establish an in-depth contextual knowledge to the challenges of IT security. The better understanding of each others domain should help that new IT security measures and laws do not compromise the openness and democracy of our society.

This conference is already the fifth workshop in a row of events held every two or three years at the Max Planck Institute. It started as a semi-public workshop for the IT people and other interested party in the Max Planck society and other research institutes. With the rising significance of the topic the idea was born to make it an international conference for legal and technical aspects of IT security. The last workshop in 2009 brought together participants from a wide range of technical, legal and sociological backgrounds joined by law enforcement agencies, public prosecutors, external professionals or forensic investigators.

07.05.2012 NTMS 2012
5th IFIP International Conference
Conference Dates: 
07 -10 May 2012
Location:  Istanbul - Turkey
Link: 
GENERAL CHAIR

Albert Levi, Sabanci University, Turkey (levi at sabanciuniv.edu)

STEERING COMMITTEE

Azzedine Boukerche – University of Ottawa, Canada
Mohamad Badra – Dhofar University, Oman
Pascal Urien – TELECOM ParisTech, France
Stamatios Kartalopoulos – University of Oklahoma, USA
Houda Labiod – Telecom ParisTech, France


TRACKS & TRACK CHAIRS

Mobility/Wireless Networks Program co–chairs
Ozgur Gurbuz, Sabanci University, Turkey
Mona Ghassemian, University of Greenwich, UK
-- Mobility technical program committee is available here


Security Program co–chairs
Antonio Mana, University of Malaga, Spain
Marek Klonowski, TU Wroclaw, Poland
-- Security technical program committee is available here


New Technologies & services Program co–chairs
Matteo Cesana, Politecnico di Milano, Italy
Susana Sargento, Universidade de Aveiro, Portugal
-- New technologies technical program committee is available here

TUTORIAL CHAIR

Albert Levi, Sabanci University, Turkey (levi at sabanciuniv.edu)

WORKSHOP CO-CHAIRS

Fatma A. Omara, Cairo University, Egypt
Thomas Watteyne, Dust Networks, USA

FINANCE CHAIR

Ibrahim Hajjeh, Ineovation, France

PUBLICITY CHAIR

Mohamad Badra, DU University, Oman
Nicolas Sklavos, Technological Educational Institute of Patras, Greece



LOCAL ORGANIZATION COMMITTEE CHAIR

Erkay Savas, Sabanci University, Turkey

02.05.2012 1. Vortrag Master von Tobias Gebhardt
Network forensics for cloud computing
Event Dates: 
02.05.2012
Location:  ITZ 010 - 11.30 Uhr
Link: 
Abstract:
The aim of this talk is to give an overview about cloud computing with particular emphasis on
Infrastructure-as-a-Service. Upcoming risks and chances of virtualization regarding to forensics
will be discussed in this topic. Therefore a prototype of a network forensics service is shown.
The Service is implemented as a part of an IaaS Model and is usable by the cloud users.
In the backend OpenNebula (opennebula.org) is extended through a forensics API while
Xplico (xplico.org) is used for the forensics analysis service.

02.05.2012 Oberseminar talk: To be announced
thesis presented by T. Gebhardt u. B. DÓleire (supervised by Prof. Dr. H. Reiser)
Event Dates: 
02.05.2012 - 11:30
Location:  ITZ 010 (University of Passau)
Link: 

02.05.2012 1. Vortrag Master von Benedikt d\' Oleire-Oltmanns
Design and implementation of a secure and adaptive storage layer across several cloud providers
Event Dates: 
02.05.2012
Location:  ITZ 010 - 12.00 Uhr
Link: 
Abstract:
The aim of this work is an in-house, server-based proxy which distributes data to different cloud
storage providers. Distributing data to different storages shall decrease vendor lock-in.
Furthermore, mechanisms to increase availability are implemented and file encryption takes
place in business environment. In-house encryption avoids to trust providers in case of
confidentiality and integrity of data. Logics for automatic provider changes or re-distributions
shall decrease costs and increase availability.


25.04.2012 Oberseminar talk: A different way to treat exceptions
presented by Markus Karwe
Event Dates: 
25.04.2012 - 11:30
Location:  ITZ 010 (University of Passau)
Link: 

18.04.2012 Oberseminar talk: WebSand: Presentation Review
presented by Eric Rothstein
Event Dates: 
18.04.2012 - 11:30
Location:  ITZ 010 (University of Passau)
Link: 

11.04.2012 Oberseminar talk: Control Flow Integrity in Web Applications
thesis presented by Patrick Gemein (supervised by Prof. Dr. J. Posegga and Bastian Braun)
Event Dates: 
11.04.2012 - 11:30
Location:  ITZ 010 (University of Passau)
Link: 

09.04.2012 ISPEC 2012
8th International Conference on Information Security Practice and Experience
Conference Dates: 
April 9-12, 2012
Location:  Hangzhou, China
Link: 
The ISPEC conference series is an established forum that brings together researchers and practitioners to provide a confluence of new information security technologies, including their applications and their integration with IT systems in various vertical sectors.
The conference proceedings are published by Springer in the Lecture Notes in Computer Science series.

We attend the conference and present our paper on Redactable Signatures for Independent Removal of Structure and Content.

04.04.2012 Oberseminar talk: Redactable Signature Schemes: How to Remove Structure and Content Independently
presented by Henrich C. Pöhls
Event Dates: 
04.04.2012 - 11:30
Location:  ITZ 010 (University of Passau)
Link: 

02.04.2012 Smartphone Security: Today and Tomorrow
Talk at CREATE-NET, Trento, Italy
Location:  Trento, Italy
Link: 
Bring your own device is an already established approach to better unify spare and labour time, make day-to-day business more flexible decentralized. Communication and workflows in the companies are optimized and the cost to administrate the various devices is minimized as the users take care of it. However, processing data in many different execution contexts, by different types of applications or combinations of these applications induces various security problems. Therefore, smartphone security has become mission critical and an important purchase criteria.
This talk gives a brief overview on existing security mechanism deployed in today\'s smartphone operating systems. Further, it identifies the deficiencies of the established security mechanisms in these system. Based on these observations, the talk will introduce various security mechanisms for Android developed by the IT-Security group at the University Passau.
Work in progress and future work will be presented as well.

21.03.2012 Oberseminar talk: WebSand: Modular Contract-Based Information Flow Policy Enforcement
presented by Eric Rothstein
Event Dates: 
21.03.2012 - 11:30
Location:  ITZ 010 (University of Passau)
Link: 

19.03.2012 Vortrag von Herrn Prof. Dr. Egon Börger - Universität Pisa
Business Process Modeling: Analyzing Standards and Tools
Location:  Raum ITZ 001 - 11.00 Uhr
Link: 
Through our work to rigorously model the intentions of two versions (1.0 and 2.0) of the OMG standard for BPMN (Business Process Modeling Notation) we detected various principled weaknesses of this standard, of the related Workflow Patterns Initiative and the YAWL language and
tool. We analyze these deficiencies and illustrate a possible way out by providing a mathematically accurate, transparent user model for an industrial BPM tool that starts from clearly defined high-level concepts of actions of agents and communication between them.

14.03.2012 Vortrag von Herrn Thomas Schreiber, SecureNet GmbH, München
WEB SECURITY
Location:  11.00 Uhr im Raum ITZ 010
Link: 

29.02.2012 Master-Vortrag von Stephan Huber
Your Android data is still not secure
Event Dates: 
11.00 Uhr
Location:  RAUM ITZ 010
Link: 

29.02.2012 Oberseminar talk: Your Android data is still not secure
thesis presented by Stephan Huber (supervised by Prof. Dr. J. Posegga and Daniel Schreckling)
Event Dates: 
29.02.2012 - 11:30
Location:  ITZ 010 (University of Passau)
Link: 

22.02.2012 Oberseminar talk: Information Flow Analysis with Mealy Machines
presented by Eric Rothstein
Event Dates: 
22.02.2012 - 11:30
Location:  ITZ 010 (University of Passau)
Link: 

7.02.2012 Prof. Dr. Günter Müller - Sicherheit datenzentrischer Dienste
Event Dates: 
07.02.2012 - 18.00 Uhr
Location:  IM HS 13
Link: 
Sicherheit verstanden als Mechanismus zum Schutz vor unbefugtem Zugriff auf Ressourcen, verkehrt sich ins Gegenteil, wenn Daten zum Kernpunkt des
Geschäftsmodells von Dienstanbietern werden.
Ausgehend von Sicherheitsvorfällen in den letzten Jahren wird gezeigt, dass alle spektakulären Fälle durch unprofessionelle Fehler und Schwachstellen ermöglicht wurden, während die Mechanismen zum Schutz ausgereicht hätten. Anders
sieht es bei datenzentrischen Diensten
aus, deren Geschäftsmodell die Nutzung
von Diensten gegen die Abgabe von persönlichen Daten lautet.

11.10.2011 Oberseminar talk: No title given, yet!!!
presented by Bastian Braun
Event Dates: 
11.10.2011 - 11:30
Location:  ITZ 010 (University of Passau)
Link: 

20.09.2010 25th IFIP International Information Security Conference
Conference Dates: 
20. - 23. September 2010
Deadline: 
15.01.2010
Location:  Brisbane, Australia
Link: 
EC-2010 is the 25th in a series of well-established international conferences on Security and Privacy organized annually by the Technical Committee 11 (TC-11) of IFIP. In 2010 it is part of the IFIP World Congress celebrating both the Golden Jubilee of IFIP and the Silver Jubilee of SEC. Papers offering novel and mature research contributions, in any aspect of information security and privacy, are solicited for submission to the conference. Papers may present theory, applications, or practical experiences on topics including but not limited to:
Access Control
Anonymity
Applications of Cryptography
Attacks and Malicious Software
Authentication and Authorization
Biometrics and Applications
Critical ICT Resources Protection
Data and Systems Integrity
Data Protection
ECommerce Security
Enterprise Security
Identity Management
Information Hiding
Information Warfare
Internet and Web Security
Intrusion Detection
Mobile Computing Security
Mobile Networks Security
Network Security Protocols Multilateral Security
Peer-to-Peer Security
Privacy Enhancing Technologies
RFID Security
Risk Analysis and Management
Secure Electronic Voting
Secure Sensor Networks
Secure Systems Development
Security Architectures
Security Economics
Security Education
Security Management
Security Metrics
Smart Cards
Software Security
Spam, SPIT, SPIM
Trust Management and Models
Trusted Computing
Ubiquitous Security

31.08.2009 TrustBus 09
Conference Dates: 
31 August - 4 September 2009
Location:  Linz, Austria
Link: 

29.08.2009 Workshop on Information Security and Privacy in a De-Perimeterised World (DISP09)
Workshop Dates: 
Workshop cancelled (29th of August 2009)
Location:  Vancouver, Canada
Link: 
The workshop has been cancelled.

16.02.2009 IT-Sicherheit am Donaustrand III
Sicherheitstechnische und sicherheitsrechtliche Herausforderung des Web 2.0
Conference Dates: 
16. Feb. 2009
Location:  Universität Passau, Passau, Germany
Link: 
Symposium zu Sicherheitstechnische und sicherheitsrechtliche Herausforderungen des Web 2.0 am Institut für IT-Sicherheit und Sicherheitsrecht (ISL) der Universität Passau am 16. Februar 2009

Neben der technischen Weiterentwicklung des Internets befindet sich auch seine Nutzung und Wahrnehmung in einem stetigen Wandel. Zunehmend gestalten sich Webinhalte interaktiver und werden verstärkt durch seine Nutzer mitbestimmt. Diese neue Sichtweise wird allgemein mit Web 2.0 bezeichnet. Sie ist begleitet von einer stetig zunehmenden Vernetzung, wie beispielsweise bei Fahrzeugen oder elektronischen Dienstgeräten, und prägt somit immer mehr den technischen Alltag unseres Lebens.

Neben neuen Möglichkeiten birgt dies jedoch auch neue Risiken. Um diese besser erkennen und verstehen zu können, bemüht sich das 3. Symposium der Veranstaltungsreihe IT-Sicherheits am Donaustrand um ein besseres Verständnis und den fachlichen Austausch von Erfahrung und Knowhow zu technischen und rechtlichen Fragen aus Wissenschaft und Praxis.

In Kooperation mit der Wirtschaftsregion Donaustädte und der Strategischen Partnerschaft IT-Sicherheit fand diese Veranstaltung bereits mehrfach erfolgreich in Regensburg und dieses Jahr zum ersten Mal auch in Linz statt und finden nun ihren Weg in die Donaustadt Passau.

Im Geiste der Veranstaltungen am Donaustrand werden wir wieder ein informatives und thematisch reichhaltiges Symposium anbieten. „IT-Sicherheit am Donaustand“ steht für eine attraktive Plattform zum Erfahrungsaustausch und zur Kooperation zwischen Industrie, Behörden und Hochschulen und bietet Ihnen die Gelegenheit, Kontakte zu knüpfen und zu vertiefen oder Kooperationen aufzunehmen.

Es ist uns hoffentlich gelungen ein für Sie interessantes und abwechslungsreiches Programm zusammenzustellen, und freuen uns, Sie auf der Veranstaltung begrüßen zu dürfen. Wie auch bei vorangegangen Veranstaltungen besteht die Möglichkeit, mit einem Informationsstand an der Veranstaltung teilzunehmen. Weitere Informationen entnehmen Sie bitte der Anmeldung.


XML RSS 2.0 Feed XML RSS 2.0 Feed You can subscribe to the Events & Conferences list using an RSS 2.0 Feed. Dates are marked using Events are marked using hCAL.

This page was auto-generated in 0.3404 seconds.

  Impressum Last modified: 24/02/2015 - 18:12:30 by hcp  Seitenanfang