mWSF08 - The 2008
miniWorkshop on Security Frameworks
WSF08 - The 2008 edition
The theory of computer security perhaps dates back to the 1970s, when
the basics of asymmetrics crypto were laid down. But `real' computer
security issues only began to be understood in the subsequent decade,
though proper computer security expertise is perhaps not younger than
the early 1990s. Still, this makes it two decades of researchers'
thinking and... it is meaningful to wonder where we are now, what the
current balance is. Have we reached satisfactory awareness that
security is vital to common computer usage? To begin with, do we really
understand security nowadays? The answers appear to sway between mobile
ad-hoc networks and widespread privacy, between service-oriented
architectures and many, many other niches.
G. Bella - Welcome and Opening Remarks
- 10:15-11:00 Jean Martina, Cambridge University: "Why should
we analyse security ceremonies?"
Gianpiero Costantino, UniCT: "Encouraging collaboration in
mobile ad-hoc networks"
- 11:45-12:00 Break
Eugenio Rustico, UniCT: "Identity Management Systems and
Web 2.0, from enterprises to OpenID"
G. Bella, UniCT: "Security against novel threat
December 2008 Aula Archimede,
Matematica e Informatica,
Università di Catania, ITALY.
Bella / email@example.com