14th IEEE Computer Security Foundations Workshop

June 11-13, 2001

Cape Breton, Nova Scotia

Sponsored by the IEEE Computer Society

Technical Program

SUNDAY June 10, 2001

 
6:30 - 7:30 Reception and Registration

MONDAY June 11, 2001

 
8:45 - 9:00 Welcome
Iliano Cervesato (Naval Research Laboratory), General Chair
Steve Schneider (Royal Holloway, University of London), Program Chair
9:00 - 10:00 Noninterference and Information Flow
Session Chair: John McLean

Noninterference Equations for Nondeterminsitic Systems
Sylvan Pinsky and Edward Zieglar (NSA)

Robust Declassification
Steve Zdancewic and Andrew C. Myers (Cornell University)

10:00 - 10:30 Break
10:30 - 12:00 Access Control
Session Chair: Ravi Sandhu

A state-transition model of trust management and access control
Ajay Chander (Stanford), Drew Dean (Xerox PARC), and John C. Mitchell (Stanford)

Revocations - a Classification
Åsa Hagström, Sushil Jajodia, Francesco Parisi-Presicce, and Duminda Wijesekera (George Mason University)

A Logical Reconstruction of SPKI
Joseph Y. Halpern (Cornell) and Ron van der Meyden (University of New South Wales)

12:00 - 2:00 Lunch
2:00 - 3:30 Protocols I
Session Chair: Gavin Lowe

A Security Analysis of the Cliques Protocols Suites
Olivier Pereira and Jean-Jacques Quisquater (Louvain University)

An Efficient Protocol Verifier Based on Prolog Rules
Bruno Blanchet (INRIA)

Proving Secrecy is Easy Enough
Veronique Cortier (ENS Cachan), Jon Millen, and Harald Ruess (SRI)

3:30 - 4:00 Break
4:00 - 5:15 Panel: Relating Cryptography and Cryptographic Protocols
Panel Chair: Andre Scedrov (University of Pennsylvania)
Panelists:
Martin Abadi (Intertrust)
Ran Canetti (IBM Yorktown)
Joshua Guttman (MITRE)
David Wagner (University of California, Berkeley)
5:30 - 8:00 Whale watching excursion

TUESDAY June 12, 2001

 
9:00 - 10:00 Information Flow and Multi-threading
Session Chair: Riccardo Focardi

A New Type System for Secure Information Flow
Geoffrey Smith (Florida International University)

A Generic Approach to the Security of Multi-threaded Programs
Heiko Mantel (German Research Centre for AI) and Andrei Sabelfeld (Chalmers University)

10:00 - 10:30 Break
10:30 - 12:00 Protocols II
Session Chair: Andre Scedrov

Authenticity by Typing for Security Protocols
Andrew D. Gordon (Microsoft Research UK) and Alan Jeffrey (DePaul University)

Computing Symbolic Models for Verifying Cryptographic Protocols
Marcelo Fiore (Cambridge) and Martin Abadi (Bell Labs Research)

Protocol Insecurity with Finite Number of Sessions is NP-complete
Michael Rusinowitch and Mathieu Turuani (INRIA)

12:00 - 2:00 Lunch
2:00 - 3:30 Intrusion Tolerance and Detection
Session Chair: Dieter Gollmann

Multi-phase Damage Confinement in Database Systems for Intrusion Tolerance
Peng Liu (University of Maryland) and Sushil Jajodia (George Mason University)

Markov Chains, Classifiers, and Intrusion Detection
Somesh Jha (University of Wisconsin), Kymie Tan, and Roy A Maxion (CMU)

Log Auditing through Model-Checking
Jean Goubault-Larrecq and Muriel Roger (INRIA and ENS Cachan)

3:30 - 4:00 Break
4:00 - 5:00 Panel: Non-interference: who needs it?
Panel Chair: Peter Ryan (Carnegie Mellon University)
Panelists:
Jon Millen (SRI)
John McLean (NRL)
Virgil Gligor (University of Maryland)
5:30 - 6:00 Business Meeting

WEDNESDAY June 13, 2001

 
9:00 - 10:00 Logics for Protocol Verification
Session Chair: Fabio Martinelli

A Compositional Logic for Protocol Correctness
Nancy Durgin, John C. Mitchell, (Stanford) and Dusko Pavlovic (Kestrel Institute)

Logical Relations for Encryption
Eijiro Sumii (University of Tokyo) and Benjamin C. Pierce (University of Pennsylvania)

10:00 - 10:30 Break
10:30 - 12:00 Secrecy and Privacy
Session Chair: Rebecca Wright

Privacy-preserving Cooperative Scientific Computations
Wenliang Du and Mikhail J. Atallah (Purdue University)

Confined Mobile Functions
Z. Dilsun Kirli (University of Edinburgh)

Confidentiality-preserving Refinement
Maritta Heisel (TU Magdeburg), Andreas Pfitzmann (TU Dresden), and Thomas Santen (University of Berlin)

12:00 - 12:15 Closing remarks. Presentation of Croquet Awards
Lunch