The IFIPTM 2017 Graduate Symposium will feature a highly interactive program that allows internationally renowned researchers and students at any stage of their graduate career to discuss the research, open issues, and state of the art in the field of Computational Trust and Trust Management.
Participation in the Graduate Symposium is independent of a submission and open to all interested students, researchers, and practitioners.
The Symposium features lectures by experts in the field, exploring the theory, philosophy and practice of Trust and Trust Management and its application to society and science. There will be ample opportunity to network with presenters and other students. Participants will work on small projects together to apply skills and knowledge and learn from each other.
Three extended abstracts will be discussed at the symposium and presented during the conference:
- Information Trust by Tosan Atele-Williams (University of Ontario Institute of Technology)
- Privacy and Trust In Cloud-based Marketplace for Data Resources by Vida Ahmadi Mehri (Blekinge Tekniska Högskola)
- Psychological Evaluation of Human Choice Behavior in Socio-technical Systems: A Rational Process Model Approach by Tim Schürmann (TU Darmstadt)
|8:00 to 9:00|
Registration and Breakfast
|08:00 to 09:00
|9:00 to 9:30|
Welcome (Stephen Marsh and Musard Balliu, Symposium Organizers)
|9:00 to 9:30 Interactivity, Part 2
Where we get an update on last night’s hard work!
|9:30 to 10:30|
Introductions and games – Individual students present their work and ideas in a collegial, supportive environment, to peers and experts and get feedback for Tuesday
|09:30 to 11:00
Trust as a Social Construct, its uses in the online world
Dr Natasha Dwyer, Victoria University, Australia
|10:30 to 11:00|
Everyone, led by Steve
|11:00 to 11:30
|11:00 to 12:30 Introducing Computational Trust, its uses, and Systems|
Prof Stephen Marsh, UOIT, Canada
|11:30 to 13:00
Trust in Application Security: Can't live with it, can't live without it.
|12:30 to 14:00 Lunch||13:00 to 14:30
Lunch and Interactivity Group Work
|14:00 to 15:00 Computational Trust and its relationships with IT Security|
Prof Christian Jensen, DTU, Denmark
|14:30 to 15:30
The second round – where students get to present their revised talks
|15:00 to 15:30|
|15:30 to 16:00
Homomorphic Encryption - an answer to privacy?
|15:30 to 17:30|
Interactivity, Part 1
In which we as a group decide on small trust-related projects that can be achieved in one night!
|16:00 to 17:00
Trust in Vehicular Networks
|Dinner and group interactivity work||17:00
Wrap up and head out to grab beer