08:45 - 09:15 - Building G Welcome Desk & Registration
09:15 - 10:45 - Room G05 Parallel Session 5A - SECRYPT
  • 19: A Flexible Architecture for Industrial Control System Honeypots Alexandru Vlad Serbanescu, Sebastian Obermeier and Der-Yeuan Yu
  • 57: Solving the Grid Defender’s Dilemma: Tamper Protection for Distributed Cyber-Physical Systems Jason Reeves and Sean Smith
  • 61: Attack Surface and Vulnerability Assessment of Automotive Electronic Control Units Martin Salfer, Hendrik Schweppe and Claudia Eckert
  • 91: Scargos: Towards Automatic Vulnerability Distribution Florian Rhinow and Michael Clear
09:15 - 10:45 - Room G06 Parallel Session 5B - SECRYPT
  • 97: Preserving Privacy in Collaborative Business Process Composition Hassaan Irshad, Basit Shafiq, Jaideep Vaidya, Muhammad Ahmed Bashir, Shafay Shamail and Nabil Adam
  • 83: Light Blind: Why Encrypt If You Can Share? Pierpaolo Cincilla, Aymen Boudguiga, Makhlouf Hadji and Arnaud Kaiser
  • 118: Phish-IDetector: Message-Id Based Automatic Phishing Detection Rakesh M. Verma and Nirmala Rai
10:45 - 11:00 - Building K Coffee-Break
11:00 - 12:00 - Room G02 Parallel Session 6A - ICE-B
  • 10: Supporting Chinese Farmers with ICT-based Information Services - An Analysis of Service Models Yun Zhang, Yanqing Duan and Yanan Hu
  • 13: Enhancing Business Processes with Web 2.0 Features Fadwa Yahya, Khouloud boukadi, Zakaria Maamar and Hanêne Ben Abdallah
  • 19: A Model of Effective IT Governance for Collaborative Networked Organizations Morooj Safdar, Greg Richards and Bijan Raahemi
11:00 - 12:00 - Room G04 Parallel Session 6A - OPTICS
  • 7: Performance Analysis of a WDMA Protocol with a Multiple Tunable Receivers Node Architecture for High-speed Optical Fiber Lans Peristera A. Baziana
  • 9: Pulley-type Ring Resonator and Optimization Dong-Po Cai, Chii-Chang Chen and Chien-Chieh Lee
  • 10: Amplitude Modulation by Superposition of Independent Light Sources Gilbert Johannes Martin Forkel and Peter Adam Hoeher
11:00 - 12:00 - Room G05 Parallel Session 6A - SECRYPT
  • 4: WeXpose: Towards on-Line Dynamic Analysis of Web Attack Payloads using Just-In-Time Binary Modification Jennifer Bellizzi and Mark Vella
  • 79: Automated Exploit Detection using Path Profiling - The Disposition Should Matter, Not the Position George Stergiopoulos, Panagiotis Petsanas, Panagiotis Katsaros and Dimitris Gritzalis
12:00 - 13:15 - Plenary G Industrial Panel

"Big data and efficient software: a new make or buy dilemma on data and software quality"

Chiara Francalanci, Politecnico di Milano, Italy

Mirco Veltri, SAP, Italy
Dario Regazzoni, EMC2, Italy
Anastasios Zafeiropoulos, Ubitech Ltd., Greece
Pascal Jansen, Thoughtworks, Italy
13:15 - 14:30 - Building RU Lunch
14:30 - 15:30 - Room G02 Parallel Session 7A - ICE-B
  • 28: The Impact of Digital Presence on Competitive Advantage - A Study Applied to Brazilian Bank Industry Claudio Luis Cruz de Oliveira, Veranise Jacubowski Correia Dubeux and Vinicius Andrade Pereira
  • 33: Meta-modelling the Strategic Alignment Model for Aligning Information Systems Support to Specific Application Domains Oscar Avila and Virginie Goepp
14:30 - 15:30 - Room G05 Parallel Session 7A - SECRYPT
  • 11: Parallel Approaches for Efficient Scalar Multiplication over Elliptic Curve Christophe Negre and Jean-Marc Robert
  • 48: MoCrySIL – Carry Your Cryptographic Keys in Your Pocket Florian Reimair, Peter Teufl, Christian Kollmann and Christoph Thaller
  • 64: Semantic Secure Public Key Encryption with Filtered Equality Test - PKE-FET Kaibin Huang, Yu-Chi Chen and Raylin Tso
15:30 - 16:15 - Building K Coffee-Break
15:30 - 16:30 - Building K Posters Session 3
  • 17: Sustainable Farm System for Peri-urban Sydney SMEs Ana Hol
  • 18: An Intelligent Tool for All-to-All Sales on the Internet - Platform for Compilation of Commercial Offers and Requests for Companies and Customers Radoslav Fasuga, Pavel Stoklasa and Martin Němec
  • 20: Measurement Framework for Business Process Outsourcing to the Cloud Mouna Rekik, Khouloud Boukadi and Hanene Ben-Abdallah
  • 24: Modelling Flexible Collaborative Process: The VCP2M Approach Fatma Ellouze, Mohamed Amine Chaabane, Eric Andonoff and Rafik Bouaziz
  • 25: Business Process Model Matching: An Approach based on Semantics and Structure Lobna Makni, Nahla Zaaboub Haddar and Hanêne Ben-Abdallah
  • 2: hHB: A Harder HB+ Protocol Ahmad Khoureich Ka
  • 9: Controlled Proxy Re-signing - Conditional Proxy Re-Signatures S. Sree Vivek and Guhan Balasubramanian
  • 39: Practical IBE Secure under CBDH - Encrypting Without Pairing S. Sree Vivek, S. Sharmila Deva Selvi, Aanchal Malhotra and C. Pandu Rangan
  • 93: A Note on Schoenmakers Algorithm for Multi Exponentiation Srinivasa Rao Subramanya Rao
  • 126: Design and Implementation of an Espionage Network for Cache-based Side Channel Attacks on AES Bholanath Roy, Ravi Prakash Giri, Ashokkumar C. and Bernard Menezes
16:30 - 17:30 - Plenary G Keynote Lecture Connecting Services to the Web of Data John Domingue, The Open University, United Kingdom
17:30 - 17:45 - Plenary G Closing Session
17:45 - 18:15 - Building K Farewell Drink