08:45
08:45 - 09:15 - Building G Welcome Desk & Registration
09:15
09:15 - 10:45 - Room G05 Parallel Session 5A - SECRYPT
  • 19: A Flexible Architecture for Industrial Control System Honeypots Alexandru Vlad Serbanescu, Sebastian Obermeier and Der-Yeuan Yu
  • 57: Solving the Grid Defender’s Dilemma: Tamper Protection for Distributed Cyber-Physical Systems Jason Reeves and Sean Smith
  • 61: Attack Surface and Vulnerability Assessment of Automotive Electronic Control Units Martin Salfer, Hendrik Schweppe and Claudia Eckert
  • 91: Scargos: Towards Automatic Vulnerability Distribution Florian Rhinow and Michael Clear
09:15 - 10:45 - Room G06 Parallel Session 5B - SECRYPT
  • 97: Preserving Privacy in Collaborative Business Process Composition Hassaan Irshad, Basit Shafiq, Jaideep Vaidya, Muhammad Ahmed Bashir, Shafay Shamail and Nabil Adam
  • 83: Light Blind: Why Encrypt If You Can Share? Pierpaolo Cincilla, Aymen Boudguiga, Makhlouf Hadji and Arnaud Kaiser
  • 118: Phish-IDetector: Message-Id Based Automatic Phishing Detection Rakesh M. Verma and Nirmala Rai
10:45
10:45 - 11:00 - Building K Coffee-Break
11:00
11:00 - 12:00 - Room G02 Parallel Session 6A - ICE-B
  • 10: Supporting Chinese Farmers with ICT-based Information Services - An Analysis of Service Models Yun Zhang, Yanqing Duan and Yanan Hu
  • 13: Enhancing Business Processes with Web 2.0 Features Fadwa Yahya, Khouloud boukadi, Zakaria Maamar and Hanêne Ben Abdallah
  • 19: A Model of Effective IT Governance for Collaborative Networked Organizations Morooj Safdar, Greg Richards and Bijan Raahemi
11:00 - 12:00 - Room G04 Parallel Session 6A - OPTICS
  • 7: Performance Analysis of a WDMA Protocol with a Multiple Tunable Receivers Node Architecture for High-speed Optical Fiber Lans Peristera A. Baziana
  • 9: Pulley-type Ring Resonator and Optimization Dong-Po Cai, Chii-Chang Chen and Chien-Chieh Lee
  • 10: Amplitude Modulation by Superposition of Independent Light Sources Gilbert Johannes Martin Forkel and Peter Adam Hoeher
11:00 - 12:00 - Room G05 Parallel Session 6A - SECRYPT
  • 4: WeXpose: Towards on-Line Dynamic Analysis of Web Attack Payloads using Just-In-Time Binary Modification Jennifer Bellizzi and Mark Vella
  • 79: Automated Exploit Detection using Path Profiling - The Disposition Should Matter, Not the Position George Stergiopoulos, Panagiotis Petsanas, Panagiotis Katsaros and Dimitris Gritzalis
12:00
12:00 - 13:15 - Plenary G Industrial Panel

Title:
"Big data and efficient software: a new make or buy dilemma on data and software quality"

Chair:
Chiara Francalanci, Politecnico di Milano, Italy

Panelists:
Mirco Veltri, SAP, Italy
Dario Regazzoni, EMC2, Italy
Anastasios Zafeiropoulos, Ubitech Ltd., Greece
Pascal Jansen, Thoughtworks, Italy
13:15
13:15 - 14:30 - Building RU Lunch
14:30
14:30 - 15:30 - Room G02 Parallel Session 7A - ICE-B
  • 28: The Impact of Digital Presence on Competitive Advantage - A Study Applied to Brazilian Bank Industry Claudio Luis Cruz de Oliveira, Veranise Jacubowski Correia Dubeux and Vinicius Andrade Pereira
  • 33: Meta-modelling the Strategic Alignment Model for Aligning Information Systems Support to Specific Application Domains Oscar Avila and Virginie Goepp
14:30 - 15:30 - Room G05 Parallel Session 7A - SECRYPT
  • 11: Parallel Approaches for Efficient Scalar Multiplication over Elliptic Curve Christophe Negre and Jean-Marc Robert
  • 48: MoCrySIL – Carry Your Cryptographic Keys in Your Pocket Florian Reimair, Peter Teufl, Christian Kollmann and Christoph Thaller
  • 64: Semantic Secure Public Key Encryption with Filtered Equality Test - PKE-FET Kaibin Huang, Yu-Chi Chen and Raylin Tso
15:30
15:30 - 16:15 - Building K Coffee-Break
15:30
15:30 - 16:30 - Building K Posters Session 3
ICE-B
  • 17: Sustainable Farm System for Peri-urban Sydney SMEs Ana Hol
  • 18: An Intelligent Tool for All-to-All Sales on the Internet - Platform for Compilation of Commercial Offers and Requests for Companies and Customers Radoslav Fasuga, Pavel Stoklasa and Martin Němec
  • 20: Measurement Framework for Business Process Outsourcing to the Cloud Mouna Rekik, Khouloud Boukadi and Hanene Ben-Abdallah
  • 24: Modelling Flexible Collaborative Process: The VCP2M Approach Fatma Ellouze, Mohamed Amine Chaabane, Eric Andonoff and Rafik Bouaziz
  • 25: Business Process Model Matching: An Approach based on Semantics and Structure Lobna Makni, Nahla Zaaboub Haddar and Hanêne Ben-Abdallah
SECRYPT
  • 2: hHB: A Harder HB+ Protocol Ahmad Khoureich Ka
  • 9: Controlled Proxy Re-signing - Conditional Proxy Re-Signatures S. Sree Vivek and Guhan Balasubramanian
  • 39: Practical IBE Secure under CBDH - Encrypting Without Pairing S. Sree Vivek, S. Sharmila Deva Selvi, Aanchal Malhotra and C. Pandu Rangan
  • 93: A Note on Schoenmakers Algorithm for Multi Exponentiation Srinivasa Rao Subramanya Rao
  • 126: Design and Implementation of an Espionage Network for Cache-based Side Channel Attacks on AES Bholanath Roy, Ravi Prakash Giri, Ashokkumar C. and Bernard Menezes
16:30
16:30 - 17:30 - Plenary G Keynote Lecture Connecting Services to the Web of Data John Domingue, The Open University, United Kingdom
17:30
17:30 - 17:45 - Plenary G Closing Session
17:45
17:45 - 18:15 - Building K Farewell Drink