6:30 - 7:30 | Reception and Registration |
8:45 - 9:00 | WELCOME
Iliano Cervesato (Naval Research Laboratory), General Chair Steve Schneider (Royal Holloway, University of London), Program Chair |
9:00 - 10:30 | Information Flow I
Session Chair: Riccardo Focardi
Approximate Non-Interference
Quantifying Information Flow
Secrecy in Multiagent Systems
|
10:30 - 11:00 | Break |
11:00 - 12:00 | Intrusion
Session Chair: Joshua Guttman
Two Formal Analyses of Attack Graphs
Formal Specification of Intrusion Signatures and Detection Rules
|
12:00 - 2:00 | Lunch |
2:00 - 3:30 | Protocols I
Session Chair: Paul Syverson
Types and Effects for Asymmetric Cryptographic Protocols
Security Protocol Design via Authentication Tests
Strand Spaces and Rank Functions: More Than Distant Cousins
|
3:30 - 4:00 | Break |
4:00 - 5:00 | Applications of model-checking
Session Chair: Steve Schneider
Probabilistic Analysis of Anonymity
Analysis of SPKI/SDSI Certificates Using Model Checking
|
5:30 - 8:00 | Whale watching excursion |
9:00 - 10:30 | Protocols II
Session Chair: Dieter Gollmann
Capturing Parallel Attacks within the Data Independence Framework
Polynomial Fairness and Liveness
A Formal Analysis of some Properties of Kerberos 5 using MSR
|
10:30 - 11:00 | Break |
11:00 - 12:00 | Games
Session Chair: Cathy Meadows
A Formal Analysis of Syverson's Rational Exchange Protocol
Game Analysis of Abuse-free Contract Signing
|
12:00 - 2:00 | Lunch |
2:00 - 3:30 | Language-based security
Session Chair: Andrei Sabelfeld
Fine-grained Information Flow Analysis for a Lambda-Calculus with Sum Types
Cryptographic Types
Secure Information Flow and Pointer Confinement in a Java-like Language
|
3:30 - 4:00 | Break |
4:00 - 5:00 | Business meeting |
9:00 - 10:30 | Distributed Rights, Access Control, and Watermarking
Session Chair: Jonathan Millen
A Privacy Policy Model for Enterprises
A Logic for Reasoning about Digital Rights
Hiding Functions and Computational Security of Image Watermarking Systems
|
10:30 - 11:00 | Break |
11:00 - 12:00 | Information flow II
Session Chair: Roberto Gorrieri
Information Flow Security in Dynamic Contexts
A Simple View of Type-Secure Information Flow in the pi-Calculus
|
12:00 - 12:15 | Closing remarks. Presentation of Croquet Awards
Lunch |