Program

List of Accepted Papers and Sessions

Monday and Tuesday: Graduate Symposium
Wednesday to Friday: Main Conference (tentative)

Please note that these programs are preliminary at this point.

Graduate Symposium

MondayTuesday
8:00 to 9:00
Registration and Breakfast
08:00 to 09:00
Discussions!
9:00 to 9:30
Welcome (Stephen Marsh and Musard Balliu, Symposium Organizers)
9:00 to 9:30 Interactivity, Part 2
Where we get an update on last night’s hard work!
9:30 to 10:30
Introductions and games – Individual students present their work and ideas in a collegial, supportive environment, to peers and experts and get feedback for Tuesday
09:30 to 11:00
Trust as a Social Construct, its uses in the online world
Dr Natasha Dwyer, Victoria University, Australia
10:30 to 11:00
Introducing Interactivity
Everyone, led by Steve
11:00 to 11:30
Coffee break
11:00 to 12:30 Introducing Computational Trust, its uses, and Systems
Prof Stephen Marsh, UOIT, Canada
11:30 to 13:00
Trust in Application Security: Can't live with it, can't live without it.
Musard Balliu
12:30 to 14:00 Lunch13:00 to 14:30
Lunch and Interactivity Group Work
14:00 to 15:00 Computational Trust and its relationships with IT Security
Prof Christian Jensen, DTU, Denmark
14:30 to 15:30
The second round – where students get to present their revised talks
15:00 to 15:30
Coffee Break
15:30 to 16:00
Homomorphic Encryption - an answer to privacy?
Anirban Basu
15:30 to 17:30
Interactivity, Part 1
In which we as a group decide on small trust-related projects that can be achieved in one night!
16:00 to 17:00
Trust in Vehicular Networks
Jan-Philipp Steghöfer
Dinner and group interactivity work17:00
Wrap up and head out to grab beer

Main Conference

 Wednesday
Main Conference
Thursday
Main Conference
Friday
Main Conference
8:30Registration opensRegistration opensRegistration opens
Morning session
9:00 to 10:30
Keynote
Max Mühlhäuser (TU Darmstadt): Trust for Security – Security for Trust
Keynote
Mathias Widman (Volvo Group Telematics/WirelessCar): Extended vehicle trust and security — how hard can it be?
Keynote
Siani Pearson (Hewlett Packard Enterprise): Strong Accountability and the New IT
Coffee break
10:30 to 11:00
Pre-Lunch session
11:00 to 12:30
Paper Session: Novel Sources of Trust and Trust InformationPanel Discussion
Trust on the road: vehicular networks beyond security
Paper Session: Applications of Trust
Conference Ending
Lunch
12:30 to 13:30
Post-Lunch session
13:30 to 15:00
Paper Session: Trust MetricsPaper Session: Reputation Systems
Doctoral Symposium presentations
Coffee break
15:00 to 15:30
Afternoon session
15:30 to 17:00
Paper Session: Information Sharing and Personal DataPoster and demo session
Evening programDinner cruise through the archipelago