The 8th IEEE Computer Security Foundations Workshop (CSFW-8) (Preliminary Program) June 13-15, 1995 Dromquinna Manor Kenmare, County Kerry, Ireland Tuesday, June 13, 1995 8:50-9:00am -- Welcoming Remarks Simon Foley (University College, Cork, General Chair) Li Gong (SRI International, Program Chair) 9:00-10:30am -- Composition Session chair: Simon Foley (UC, Cork, Ireland) * The Composability of Non-Interference Aris Zakinthinos and E.S. Lee (University of Toronto) * Composing and Decomposing Systems under Security Properties A.W. Roscoe and L. Wulf (Oxford University) * Algebraic Properties of System Composition in the Loral, Ulysses and McLean Trace Models A.P. Maneki (DoD, U.S.A.) 10:30-11:00am -- Coffee Break 11:00-12:00pm -- Authentication Protocols Session chair: Michael Reiter (AT&T Bell Laboratories) * Optimal Authentication Protocols Resistant to Password Guessing Attacks Li Gong (SRI International) * Key Distribution without Individual Trusted Authentication Servers Liqun Chen, Dieter Gollmann, and Christopher Mitchell (Royal Holloway, University of London) 12:00-2:00pm -- Lunch Break and Croquet Tournament 2:00-3:00pm -- Analysis of Cryptographic Protocols Session chair: Gene Tsudik (IBM Zurich Research Laboratory) * Towards a Classification of Key Agreement Protocols Colin Boyd (University of Manchester) * An Augmentation of BAN-Like Logics Wenbo Mao (HP Laboratories, Bristol) 3:00-3:30pm -- Coffee Break 3:30-5:00pm -- Panel on "What Makes a Dependable Crypto Protocol" Panel moderator: Catherine Meadows (U.S. Naval Research Lab) Panelists: to be announced Wensdesday, June 14, 1995 9:00-10:30am -- Issues in Implementations Session chair: Jonathan Millen (The MITRE Corporation) * The Security Checker: a Semantics-Based Tool for the Verification of Security Properties R. Focardi, R. Gorrieri, and V. Panini (University of Bologna) * Implementation of a Discretionary Access Control Model for Script-based Systems Trent Jaeger and Atul Prakash (University of Michigan) * Building Higher Resolution Synthetic Clocks for Signaling in Covert Timing Channels John Janeri, Daniel Schnackenberg, and Daylan Darby (The MITRE Corporation and Boeing Defense and Space Group) 10:30-11:00am -- Coffee Break 11:00-12:00pm -- Models of Cryptographic Protocols Session chair: Michael Merritt (AT&T Bell Laboratories) * Modelling and verifying key-exchange protocols using CSP and FDR A.W. Roscoe (Oxford University) * Using Temporal Logic to Specify and Verify Cryptographic Protocols James W. Gray, III and John McLean (H.K. Univ. of Science and Technology and U.S. Naval Research Lab) 12:00-2:00pm -- Lunch Break and Croquet Tournament 2:00-3:00pm -- Secure Systems Session chair: John McLean (Naval Research Laboratory) * Concurrency Control for Federated Multilevel Secure Database Systems I.E. Kang and T.F. O'Keefe (GTE Laboratories and Pennsylvania State University) * Specifying Security for CSCW Systems Simon Foley and Jeremy Jacob (University College, Cork, and University of York) 3:00-3:30pm -- Coffee Break 3:30-5:00pm -- Panel on "Considering the Common Criteria" Panel moderator: Jane Sinclair (Open University, U.K.) Panelists: to be announced Thursday, June 15, 1995 9:00-10:00am -- Information Flow Session chair: Joshua Guttman (The MITRE Corporation) * The Epistemic Representation of Information Flow Security in Probabilistic Systems Paul F. Syverson and James W. Gray, III (U.S. Naval Research Lab and H.K. Univ. of Science and Technology) * Connection Policies and Controlled Interference William R. Bevier, Richard M. Cohen, and William D. Young (Computational Logic, Inc.) 10:00-10:30am -- Coffee Break 10:30-12:00pm -- Workshop Business Meeting (arrangements for CSFW-9, open to all participants) 12:00pm -- Workshop Adjourns