Program

Thursday
8:30-9:15 Registration
9:15-9:30 Welcome and conference opening
9:30-10:30 Steinacker (UNHCR) opening talk, day 1
10:30-11:00 Coffee break
11:00-12:30 Huehnlein et al How to harmonise local and remote signing
Engelbertz et al Security Analysis of XAdES Validation in the CEF Digital Signature Services (DSS)
Huehnlein et al. Towards a standardised preservation service for qualified electronic signatures and qualified electronic seals
12:30-13:30 Lunch break
13:30-15:00 Kuehne* Evolving the DSS-X standard
Strack et al.  * eIDAS eID & eSignature based Service Accounts at University environments for crossboarder/domain access
Wilson et al Business Models for Open Digital Ecosystems of Trustable Assistants
15:00-15:30 Coffee break
15:30-16:00 Faehnrich et al * EU-GDPR: A software-supported process model for corporate practice – Enabling SMEs to comply with the complex new EU data protection regulation
16:00-16:30 Zibuschka et al Anonymization Is Dead – Long Live Privacy
16:30-17:30 Panel discussion
Friday
8:30-9:00 Registration
9:00-10:00 Roman Beck, ITU Keynote, day 2
10:00-10:30 Mell et al Smart Contract Federated Identity Management without Third Party Authentication Services
10:30-11:00 Coffee break
11:00-12:30 Vargas* Blockchain-based consent manager for GDPR compliance
Wagner G. et al DNS-based Trust Scheme Publication and Discovery
Wagner S. et al Unified Data Model for Tuple-Based Trust Scheme Publication
12:30-13:30 Lunch break
13:30-15:00 Mueller et al. Let’s Revoke! Mitigating Revocation Equivocation by re-purposing the Certificate Transparency Log
Moedersheim et al GTPL: A Graphical Trust Policy Language
 Weinhardt et al.* Lessons learned – Conducting a User Experience evaluation of a Trust Policy Authoring Tool
15:00-15:30 Coffee break
15:30-17:00 Zibuschka et al. The ENTOURAGE Privacy and Security Reference Architecture for Internet of Things Ecosystems
Johnson Jeyakumar et al. Implementation of Distributed Light weight trust infrastructure for automatic validation of faults in an IOT sensor network
Omolola et al. * Policy-based Access Control for the IoT and Smart Cities

Accepted Full Papers

Tina Huehnlein, Detlef Hühnlein, Tobias Wich, Florian Otto and Mike Prechtl Towards a standardised preservation service for qualified electronic signatures and qualified electronic seals
Detlef Hühnlein, Tobias Wich, Tina Hühnlein, Sebastian Schuberth, René Lottes, Neil Crossley and Florian Otto How to harmonise local and remote signing
Peter Mell, Jim Dray and James Shook Smart Contract Federated Identity Management without Third Party Authentication Services
Georg Wagner, Stefan More, Sven Wagner and Martin Hoffmann DNS-based Trust Scheme Publication and Discovery
Cristina Mihale-Wilson and Michael Kubach Business Models for Open Digital Ecosystems of Trustable Assistants
Jan Zibuschka, Sebastian Kurowski, Heiko Roßnagel, Christian Schunck and Christian Zimmermann Anonymization Is Dead – Long Live Privacy
Isaac Henderson Johnson Jeyakumar, Sven Wagner and Heiko Roßnagel Implementation of Distributed Light weight trust infrastructure for automatic validation of faults in an IOT sensor network
Nils Engelbertz, Vladislav Mladenov, Juraj Somorovsky, David Herring, Nurullah Erinola and Jörg Schwenk

 

Security Analysis of XAdES Validation in the CEF Digital Signature Services (DSS)
Sebastian A. Mödersheim and Bihang Ni GTPL: A Graphical Trust Policy Language
Jan Zibuschka, Moritz Horsch and Michael Kubach The ENTOURAGE Privacy and Security Reference Architecture for Internet of Things Ecosystems
Sven Wagner, Sebastian Kurowski and Heiko Roßnagel Unified Data Model for Tuple-Based Trust Scheme Publication
Tobias Mueller and Marius Stübs Let’s Revoke! Mitigating Revocation Equivocation by re-purposing the Certificate Transparency Log

Accepted Short Papers

Olamide Omolola, Stefan More, Georg Wagner, Lukas Alber and Edona Fasllija Policy-based Access Control for the IoT and Smart Cities
Juan Camilo Vargas Blockchain-based consent manager for GDPR compliance
Hermann Strack, Sebastian Klinner, Oliver Otto and Andre Schmidt eIDAS eID & eSignature based Service Accounts at University environments for crossboarder/domain access
Nicolas Fähnrich and Michael Kubach EU-GDPR: A software-supported process model for corporate practice – Enabling SMEs to comply with the complex new EU data protection regulation
Andreas Kuehne Evolving the DSS-X standard
Stephanie Weinhardt and Doreen St.Pierre Lessons learned – Conducting a User Experience evaluation of a Trust Policy Authoring Tool