Conference Final Program
(Last Updated: 23 July, 2016 01:22:01 PM)
Wednesday, 20 July 2016 |
13:30 – 15:30 |
S052: Adaptive and Context-aware Security, Privacy and Trust Room: Dockside 6 Chair(s): Vasilis Katos, Bournemouth University, United Kingdom; Lynne Coventry, Northumbria University, United Kingdom
|
- Interactive Discovery and Retrieval of Web Resources Containing Home Made Explosive Recipes
George Kalpakis, Theodora Tsikrika, Christos Iliou, Thodoris Mironidis, Stefanos Vrochidis, Centre for Research and Technology-Hellas (CERTH), Greece; Jonathan Middleton, Una Williamson, Police Service Northern Ireland (PSNI), Ireland; Ioannis Kompatsiaris, Centre for Research and Technology-Hellas (CERTH), Greece
- Information Security Application Design: Understanding Your Users
Ranjan Bhattarai, Ger Joyce, Saurabh Dutta, Rapid7, United States
- The Impact of Security Cues on User Perceived Security in E-Commerce
Samuel N. Smith, Fiona Fui-Hoon Nah, Maggie X. Cheng, Missouri University of Science and Technology, United States
- Anonymous Authentication with a Bi-directional Identity Federation in the Cloud
Fatema Rashid, Ali Miri, Ryerson University, Canada
- Implicit Authentication for Mobile Devices Using Typing Behavior
Jonathan Gurary, Ye Zhu, Cleveland State University, United States; Nahed Alnahash, Huirong Fu, Oakland University, United States
Top |
Thursday, 21 July 2016 |
13:30 – 15:30 |
S130: The human factor in information security Room: Dockside 6 Chair(s): Ulrike Hugl, University of Innsbruck, Austria; Florian Kammüller, Middlesex University London, United Kingdom
|
- Attack Tree Analysis for Insider Threats on the IoT using Isabelle
Florian Kammüller, Middlesex University London, United Kingdom; Jason R.C. Nurse, University of Oxford, United Kingdom; Christian W. Probst, Technical University Denmark, Denmark
- Optional Data Disclosure and the Online Privacy Paradox: A UK Perspective
Meredydd Williams, Jason R.C. Nurse, University of Oxford, United Kingdom
- Current Trend of end-users’ behaviors towards security mechanisms
Yasser M. Hausawi, Institute of Public Administration, Saudi Arabia
- Mass surveillance in cyberspace and the lost art of keeping a secret: Policy lessons for Government after the Snowden leaks
Theo Tryfonas, University of Bristol, United Kingdom; Michael Carter, Queen’s University, Canada; Tom Crick, Cardiff Metropolitan University, United Kingdom; Panagiotis Andriotis, University College London, United Kingdom
- Security by Compliance? A Study of Insider Threat Implications for Nigerian Banks
Tesleem Fagade, Theo Tryfonas, University of Bristol, United Kingdom
Top |
16:00 – 18:00 |
S148: Technological advances in security Room: Dockside 6 Chair(s): Roberta C.S. Salomao, University of Lisbon, Portugal
|
- Security middleware programming using P4
Péter Vörös, Attila Kiss, Eötvös Loránd University, Hungary
- Towards a Usable Framework for Modelling Security and Privacy Risks in the Smart Home
Jason R.C. Nurse, Ahmad Atamli, Andrew Martin, University of Oxford, United Kingdom
- OpenStack Firewall as a Service rule analyser
Dániel Csubak, Attila Kiss, Eötvös Loránd University, Hungary
- Share to Protect - Quantitative Study on Privacy Issues in V2X-Technology
Teresa Schmidt, Ralf Philipsen, Martina Ziefle, RWTH Aachen University, Germany
- The state of Near-Field Communication
(NFC) on the Android platform
Jaromir Karmazin, Pavel Ocenášek, Brno University of Technology, Czech Republic
- Vibration based Tangible Tokens for Intuitive Pairing among Smart Devices
Donghan Park, Hyunseung Choo, Sungkyunkwan University, Korea
Top |
Friday, 22 July 2016 |
13:30 – 15:30 |
S202: Sociotechnical approaches in cyber and security human factors Room: Dockside 5 Chair(s): Theo Tryfonas, University of Bristol, United Kingdom
|
- Responsibility Modelling and its Application Trust Management.
Andrew Blyth, University of South Wales, United Kingdom
- [Presentation Canceled] Fraud Protection for Online Banking -
A User-Centered Approach on Detecting Typical Double-Dealings due to Social Engineering and Inobservance whilst Operating with Personal Login Credentials
Verena M.I.A. Hartl, Ulrike Schmuntzsch, Technische Universität Berlin, Germany
- A taxonomy to classify risk end-user profile in interaction with the computing environment
Karla Susiane Pereira, Eduardo Feitosa, Tayana Conte, Federal University of Amazonas (UFAM), Brazil
- Proposed Privacy Patterns for Privacy Preserving Healthcare Systems in Accord with Nova Scotia’s Personal Health Information Act
Maha Aljohani, Kirstie Hawkey, James Blustein, Dalhousie University, Canada
- Secure Communication Protocol between a Human and a Bank Server for Preventing Man-in-the-Browser Attacks
Takashi Tsuchiya, Masahiro Fujita, Shizuoka University, Japan; Kenta Takahashi, Hitachi, Ltd., Japan; Takehisa Kato, Toshiba Corporation Industrial ICT Solutions Company, Japan; Fumihiko Magata, NTT Corporation, Japan; Yoshimi Teshigawara, Ryoichi Sasaki, Tokyo Denki University, Japan; Masakatsu Nishigaki, Shizuoka University, Japan
- User Identification Using Games
Oliver Buckley, Duncan Hodges, Cranfield University, United Kingdom
Top |