Technical Program
6:00 - 7:00 |
Dinner |
8:45 - 9:00 |
WELCOME
|
9:00 - 10:30 |
Protocols
I A
Theory of Dictionary Attacks and its Complexity Generic
Insecurity of Cliques-Type Authenticated Group Key Agreement
Protocols Abstraction
and Refinement in Protocol Derivation |
10:30 - 11:00 |
Break |
11:00 - 12:00 |
Access
Control A
Distributed Calculus for Role-Based Access Control From
Stack Inspection to Access Control: A Security Analysis for
Libraries |
12:00 - 2:00 |
Lunch |
2:00 - 3:00 |
Intrusion
Detection Selecting
Appropriate Counter-Measures in an Intrusion Detection
Framework Using
Active Learning in Intrusion Detection |
3:00 - 3:30 |
Break |
3:30 – 4:30 |
Information
Flow Secure
Information Flow by Self-Composition Lenient
Array Operations for Practical Secure Information Flow |
4:30 – 5:30 |
Business meeting |
6:00 - 7:00 |
Dinner |
9:00 - 10:30 |
Security
Policies Owned
Policies for Information Security Cassandra:
Flexible Trust Management, Applied to Electronic Health
Records The
Consistency of Task-Based Authorization Constraints in Workflow
Systems |
10:30 - 11:00 |
Break |
11:00 - 12:00 |
Declassification
& Information Flow Enforcing
Robust Declassification Modelling
Downgrading in Information Flow Security |
12:00 - 2:00 |
Lunch |
2:00 - 3:00 |
Formal
Methods & Cryptography Symmetric
Encryption in a Simulatable Dolev-Yao Style Cryptographic
Library On
Universally Composable Notions of Security for Signature,
Certification and Authentication |
3:00 - 3:30 |
Break |
3:30 - 5:00 |
Panel:
Formal Methods & Cryptography |
6:00 - 7:00 |
Dinner |
9:00 – 10:00 |
Authorization By
Reason and Authority: A System for Authorization of Proof-Carrying
Code A
Formal Foundation for XrML Licenses |
10:00 – 10:30 |
Break |
10:30 - 11:30 |
Protocols
II Formal
analysis of multi-party contract signing Symbolic
Model Checking the Knowledge of the Dining Cryptographers |
11:30 – 11:45 |
Closing
remarks. Presentation of awards |
12:00 |
Lunch |