Program

Conference details

  • Conference venue: Karlstad university, building 21 “Vänern”, auditorium 21A 342 (Eva Eriksson hall).
  • Registration, all sessions and coffee breaks are placed in building 21. Please come to the 3rd floor to Eva Eriksson hall for registration!
  • Lunch will be served at the “Solsta Inn” cafeteria in building 1, room 1B243 (next to the library building) – there you’ll see the cafeteria!
  • Coffee breaks will get served in the hall in front of Eva Eriksson hall.

 

Wednesday, October 4th

Optional get-together from 20:00 at “Pitcher’s“, north side of Stora Torget (market square) central in Karlstad.

Thursday, October 5th

Conference venue: Karlstad university, building 21 “Vänern”, auditorium 21A 342 (Eva Eriksson hall).

08:30 Registration

09:15 Welcome and conference opening

09:30-10:00 Opening talk: Dr. Sebastian Herold, Assistant Professor in Software Engineering, Karlstad University, Sweden

TITLE: A Literature Study on Privacy Patterns Research

ABSTRACT: Facing the implementation of the EU General Data Protection Regulation (GDPR) in May 2018, many commercial software providers will soon need to adapt their products to new privacy-related constraints. Privacy patterns defined for different aspects of the software engineering process promise to be a useful concept for this task. In this situation, it seems valuable to characterize the state of the research related to privacy patterns. This talk presents the results of an extensive literature study on privacy patterns for Privacy by Design.

BIO: Sebastian’s research interests focus on software architecture and design, software evolution, and software quality. More specifically, he currently works on methods and tools helping software engineers mitigate software architecture erosion and technical debt. He is in particular interested in evaluating these and other approaches empirically in collaboration with industry.

Technical aspects of eID

10:00-10:30 Georg Wagner, Olamide Omolola and Stefan More: Harmonizing Delegation Data Formats

10:30-11:00 Coffee break

11:00-11:30 Moritz Horsch, Johannes Braun and Johannes Buchmann: Password Assistance

11:30-12:00 Sven Wagner, Sebastian Kurowski, Uwe Laufs and Heiko Roßnagel: A Mechanism for Discovery and Verification of Trust Scheme Memberships: The Lightest Reference Architecture

12:00-12:30 Matthias Winterstetter and Sebastian Kurowski: A meta-heuristic for access control test data creation in access control model testing

12:30-13:30 Lunch break

Derived identities

13:30-14:00 Lothar Fritsch and Nurul Momen: Derived Partial Identities Generated from App Permissions

14:00-14:30 Daniel Träder, Alexander Zeier and Andreas Heinemann: Design and Implementation Aspects of Mobile Derived Identities

14:30-15:00 Coffee break

Privacy

15:00-15:30 Lothar Fritsch:  Privacy dark patters in identity management

15:30-16:00 Pritam Dash, Christof Rabensteiner, Felix Hoerandner and Simon Roth: Towards Privacy-Preserving and User-Centric Identity Management as a Service

16:00-17:00 Panel discussion: The future of Open Identity

19:00 Conference dinner: Restaurant at Clarion hotell Plaza, Västra Torggatan 2, at 19.00.

 

Friday, October 6th

Conference venue: Karlstad university, building 21 “Vänern”, auditorium 21A 342 (Eva Eriksson hall).

08:30 Registration

09:00-10:00 Keynote talk: Prof. Dr. Audun Jøsang, University of Oslo, Norway.

TITLE: The same one as last time: Recognizing entities on the Internet

ABSTRACT: Every entity that communicates via the Internet must have an identity in order to take part in the communication. The number of entities (people, systems and things) communicating over the Internet grows exponentially, hence the management of their identities becomes increasingly complex from the technical, business and legal perspectives. This talk analyses the major trends in identity management and points out challenges and opportunities.

BIOGRAPHY: Audun Jøsang is professor in cybersecurity at the University of Oslo. His research focuses on big data security analytics, identity management, trusted computing, intelligence analysis, and reasoning under uncertainty. He has worked as Associate Professor at QUT in Australia, as telecommunications engineer for Alcatel in Belgium and for Telenor in Norway. He holds a Master’s degree in Information Security from Royal Holloway College, University of London, and a PhD from NTNU in Norway.

Payment systems

10:00-10:30 Tobias Wich, Detlef Hühnlein and Daniel Nemmert: Towards secure and standard-compliant implementations of the PSD2 Directive

10:30-11:00 Coffee break

11:00-11:30 Jens-Matthias Bohli, Aljoscha Dietrich, Ronald Petrlic and Christoph Sorge: Payment Tokens for the IoT

Security culture

11:30–12:00 Ilirjana Ajazaj and Sebastian Kurowski: An explorative approach on the impact of external and organizational events on information security

12:00–12:30 Sebastian Kurowski and Fabina Dietrich:    Response and Cultural Biases in Information Security Policy Compliance Research

12:30-13:30 Lunch break

Corporate application of eID

13:30-14:00 Nicolas Fähnrich and Michael Kubach: Open ecosystem platforms for assistants and IoT-devices: a look into corporate practive

14:00-14:30 Andrea Horch, Uwe Laufs and Rachelle Sellung: A Semantic Data Model for the Development of Secure and Valuable Software

14:30-15:00 Coffee break

15:00-15:30 Uwe Laufs and Heiko Roßnagel: Towards a Smart Assistant for Enterprise Availability Management

15:30-16:00 Steffen Schwalm: A service for the preservation of evidence and data – a key for a trustworthy & sustainable electronic business

Rump session

16:00 – 17:00 Spontaneous mini-presentations – contact Lothar Fritsch with your suggestion!

End of conferernce.

 

Cultural events in Karlstad

You’ll have the opportunity to attend two unique cultural events after the conference. Book yourself & enjoy!