8:45 - 9:00 | Welcome E. Stewart Lee (Cambridge University), General Chair Paul Syverson (Naval Research Laboratory), Program Chair |
9:00 - 10:00 | Names and Certificates Local Names In SPKI/SDSI Ninghui Li (New York University) Reasoning about Trust and Insurance in a Public Key Infrastructure Jonathan Millen (SRI) and Rebecca Wright (AT&T Labs -- Research) |
10:00 - 10:30 | Break |
10:30 - 12:00 |
Strands and Multiset Rewriting Protocol Independence through Disjoint Encryption Joshua D. Guttman and F. Javier THAYER Fabrega (MITRE) Relating Strands and Multiset Rewriting for Security Protocol Analysis Iliano Cervesato (ITT Industries), Nancy Durgin (Stanford), Patrick Lincoln (SRI), John Mitchell (Stanford), and Andre Scedrov (Pennsylvania) Optimizing Protocol Rewrite Rules of CIL Specifications G. Denker (SRI), J. Millen (SRI) J. Kuester-Filipe (Tech. Univ. Braunschwieg), and A. Grau (Tech. Univ. Braunschwieg) |
12:00 - 2:00 | Lunch |
2:00 - 3:30 |
Automated Security Protocol Methods Looking for diamonds in the desert: extending automatic protocol generation to three-party authentication and key agreement protocols Adrian Perrig and Dawn Xiadong Song (UC, Berkeley) C3PO: A Tool for Automatic Sound Cryptographic Protocol Analysis Anthony H. Dekker (DSTO and Australian National University) An Executable Specification Language for Planning Attacks to Security Protocols Luigia Carlucci Aiello (Univ. Roma ``La Sapienza'') and Fabio Massacci (Univ. Di Siena) |
3:30 - 4:00 | Break |
4:00 - 5:30 | Panel: Intrusion Detection Panel Chair: Teresa Lunt (Xerox PARC) Panelists: TBD |
9:00 - 10:00 |
Network Security Analyzing single-server network inhibition Tuomas Aura (Helsinki University of Technology), Matt Bishop, (UC, Davis), and Dean Sniegowski (UC, Davis) Reasoning About Secrecy for Active Networks Carl A. Gunter (U. Pennsylvania), Pankaj Kakkar (U. Pennsylvania), and Martín Abadi (Lucent, Bell Labs) |
10:00 - 10:30 | Break |
10:30 - 12:00 |
Invariants, Induction, Ranks, Languages, and Ideals Towards automatic verification of authentication protocols on an unbounded network James Heather and Steve Schneider (Royal Holloway, University of London) TAPS: A First-Order Verifier for Cryptographic Protocols Ernie Cohen (Telcordia) Invariant Generation Techniques in Cryptographic Protocol Analysis Catherine Meadows (Naval Research Lab) |
12:00 - 2:00 | Lunch |
2:00 - 3:30 |
Noninterference and Information Flow Information Flow Analysis in a Discrete-Time Process Algebra Riccardo Focardi (U. Venezia - Ca' Foscari), Roberto Gorrieri (U. Bologna), and Fabio Martinelli (IAT-CNR) Possibilistic Definitions of Security -- An Assembly Kit -- Heiko Mantel (German Research Center for Artificial Intelligence (DFKI)) Probabilistic Noninterference for Multi-threaded Programs Andrei Sabelfeld and David Sands (Chalmers University of Technology) |
3:30 - 4:00 | Break |
4:00 - 5:00 | Invited Talk: "American Fish and Colossus, WW II Codebreaking in Bletchley Park"
Anthony E Sale, Hon. FBCS, ex Museums Director, Bletchley Park |
9:00 - 10:00 |
Java and Mobile Code Security An Operational Semantics of Java 2 Access Control Guenter Karjoth (IBM Research) Confidentiality for Mobile Code: The Case of a Simple Payment Protocol Mads Dam and Pablo Giambiagi (SICS) |
10:00 - 10:30 | Break |
10:30 - 12:00 |
Types and Language-Based Security Secure Introduction of One-way Functions Dennis Volpano (Naval Postgraduate School) How to Prevent Type Flaw Attacks on Security Protocols James Heather (Royal Holloway), Gavin Lowe (U. Leicester), and Steve Schneider (Royal Holloway) Secure Composition of Untrusted Code: Wrappers and Causality Types Peter Sewell (Cambridge) and Jan Vitek (Purdue) |
12:00 - ?? | Closing remarks. Presentation of Croquet Awards Lunch Field Trip to Bletchley Park |