Graduate Symposium

The IFIPTM 2017 Graduate Symposium will feature a highly interactive program that allows internationally renowned researchers and students at any stage of their graduate career to discuss the research, open issues, and state of the art in the field of Computational Trust and Trust Management.

Participation in the Graduate Symposium is independent of a submission and open to all interested students, researchers, and practitioners.

The Symposium features lectures by experts in the field, exploring the theory, philosophy and practice of Trust and Trust Management and its application to society and science. There will be ample opportunity to network with presenters and other students. Participants will work on small projects together to apply skills and knowledge and learn from each other.

Three extended abstracts will be discussed at the symposium and presented during the conference:

  • Information Trust by Tosan Atele-Williams (University of Ontario Institute of Technology)
  • Privacy and Trust In Cloud-based Marketplace for Data Resources by Vida Ahmadi Mehri (Blekinge Tekniska Högskola)
  • Psychological Evaluation of Human Choice Behavior in Socio-technical Systems: A Rational Process Model Approach by Tim Schürmann (TU Darmstadt)
MondayTuesday
8:00 to 9:00
Registration and Breakfast
08:00 to 09:00
Discussions!
9:00 to 9:30
Welcome (Stephen Marsh and Musard Balliu, Symposium Organizers)
9:00 to 9:30 Interactivity, Part 2
Where we get an update on last night’s hard work!
9:30 to 10:30
Introductions and games – Individual students present their work and ideas in a collegial, supportive environment, to peers and experts and get feedback for Tuesday
09:30 to 11:00
Trust as a Social Construct, its uses in the online world
Dr Natasha Dwyer, Victoria University, Australia
10:30 to 11:00
Introducing Interactivity
Everyone, led by Steve
11:00 to 11:30
Coffee break
11:00 to 12:30 Introducing Computational Trust, its uses, and Systems
Prof Stephen Marsh, UOIT, Canada
11:30 to 13:00
Trust in Application Security: Can't live with it, can't live without it.
Musard Balliu
12:30 to 14:00 Lunch13:00 to 14:30
Lunch and Interactivity Group Work
14:00 to 15:00 Computational Trust and its relationships with IT Security
Prof Christian Jensen, DTU, Denmark
14:30 to 15:30
The second round – where students get to present their revised talks
15:00 to 15:30
Coffee Break
15:30 to 16:00
Homomorphic Encryption - an answer to privacy?
Anirban Basu
15:30 to 17:30
Interactivity, Part 1
In which we as a group decide on small trust-related projects that can be achieved in one night!
16:00 to 17:00
Trust in Vehicular Networks
Jan-Philipp Steghöfer
Dinner and group interactivity work17:00
Wrap up and head out to grab beer