6:30 - 7:30 | Reception and Registration |
8:45 - 9:00 | Welcome
Iliano Cervesato (Naval Research Laboratory), General Chair Steve Schneider (Royal Holloway, University of London), Program Chair |
9:00 - 10:00 | Noninterference and Information Flow
Session Chair: John McLean Noninterference Equations for Nondeterminsitic Systems
Robust Declassification
|
10:00 - 10:30 | Break |
10:30 - 12:00 | Access Control
Session Chair: Ravi Sandhu A state-transition model of trust management and access control
Revocations - a Classification
A Logical Reconstruction of SPKI
|
12:00 - 2:00 | Lunch |
2:00 - 3:30 | Protocols I
Session Chair: Gavin Lowe A Security Analysis of the Cliques Protocols Suites
An Efficient Protocol Verifier Based on Prolog Rules
Proving Secrecy is Easy Enough
|
3:30 - 4:00 | Break |
4:00 - 5:15 | Panel: Relating Cryptography and Cryptographic Protocols
Panel Chair: Andre Scedrov (University of Pennsylvania) Panelists: Martin Abadi (Intertrust) Ran Canetti (IBM Yorktown) Joshua Guttman (MITRE) David Wagner (University of California, Berkeley) |
5:30 - 8:00 | Whale watching excursion |
9:00 - 10:00 | Information Flow and Multi-threading
Session Chair: Riccardo Focardi A New Type System for Secure Information Flow
A Generic Approach to the Security of Multi-threaded Programs
|
10:00 - 10:30 | Break |
10:30 - 12:00 | Protocols II
Session Chair: Andre Scedrov Computing Symbolic Models for Verifying Cryptographic Protocols
Protocol Insecurity with Finite Number of Sessions is NP-complete
|
12:00 - 2:00 | Lunch |
2:00 - 3:30 | Intrusion Tolerance and Detection
Session Chair: Dieter Gollmann Multi-phase Damage Confinement in Database Systems for Intrusion Tolerance
Markov Chains, Classifiers, and Intrusion Detection
Log Auditing through Model-Checking
|
3:30 - 4:00 | Break |
4:00 - 5:00 | Panel: Non-interference: who needs it?
Panel Chair: Peter Ryan (Carnegie Mellon University) Panelists: Jon Millen (SRI) John McLean (NRL) Virgil Gligor (University of Maryland) |
5:30 - 6:00 | Business Meeting |
9:00 - 10:00 | Logics for Protocol Verification
Session Chair: Fabio Martinelli A Compositional Logic for Protocol Correctness
Logical Relations for Encryption
|
10:00 - 10:30 | Break |
10:30 - 12:00 | Secrecy and Privacy
Session Chair: Rebecca Wright Privacy-preserving Cooperative Scientific Computations
Confined Mobile Functions
Confidentiality-preserving Refinement
|
12:00 - 12:15 | Closing remarks. Presentation of Croquet Awards
Lunch |