16th IEEE Computer Security Foundations Workshop

 

30 June - 2 July, 2003

Asilomar Conference Center

 

Technical Program

SUNDAY June 29, 2003

6:00 - 7:00

Dinner


MONDAY June 30, 2003

8:45 - 9:00

WELCOME
Dennis Volpano (Cranite Systems Inc.), General Chair
Riccardo Focardi (University of Venice), Program Chair

9:00 - 10:30

Information Flow
Session Chair: Andrei Sabelfeld

Probabilistic Noninterference through Weak Probabilistic Bisimulation
Geoffrey Smith (Florida International University)

Secure Contexts for Confidential Data
Annalisa Bossi, Damiano Macedonio, Carla Piazza, Sabina Rossi, (Universita' Ca' Foscari di Venezia)

Observational Determinism for Concurrent Program Security
Steve Zdancewic (University of Pennsylvania), Andrew Myers (Cornell University)

10:30 - 11:00

Break

11:00 - 12:00

Protocols I
Session Chair: Pierpaolo Degano

Symbolic Protocol Analysis with Products and Diffie-Hellman Exponentiation
Jonathan Millen, Vitaly Shmatikov (SRI International)

A Procedure for Verifying Security Against Type Confusion Attacks
Catherine Meadows (Naval Research Laboratory)

12:00 - 2:00

Lunch

2:00 - 3:00

Logics for Anonymity and Distributed System Security
Session Chair: Paul Syverson

Anonymity and Information Hiding in Multiagent Systems
Joseph Halpern,  Kevin O'Neill (Cornell University)

Understanding SPKI/SDSI Using First-Order Logic
Ninghui Li, John Mitchell (Stanford University)

3:00 - 3:30

Break

3:30 - 5:00

Panel 1: Free Term Algebras for Protocol Analysis:What Are They Missing?

Moderator:
Jonathan Millen (SRI International)
Panel Members: Catherine Meadows (NRL), Andre Scedrov (U. Penn.)

5:00 - 6:00

Business meeting

6:00 - 7:00

Dinner


TUESDAY July 1, 2003

9:00 - 10:30

Protocols II
Session Chair: Chris Hankin

A Derivation System for Security Protocols and its Logical Formalization
Anupam Datta, Ante Derek, John Mitchell, (Stanford University), Dusko Pavlovic (Kestrel Institute)

Automatic Validation of Protocol Narration
Chiara Bodei (University of Pisa), Mikael Buchholtz (Technical University of Denmark), Pierpaolo Degano (University of Pisa), Flemming Nielson, Hanne Riis Nielson (Technical University of Denmark)

On Distributed Security Transactions that use Secure Transport Protocols
Philippa Broadfoot, Gavin Lowe (Oxford University Computing Laboratory)

10:30 - 11:00

Break

11:00 - 12:00

Access Control & Information Flow
Session Chair: Geoffrey Smith

Using Access Control for Secure Information Flow in a Java-like Language
Anindya Banerjee (Kansas State University), David Naumann (Stevens Institute of Technology)

Type-Based Distributed Access Control
Tom Chothia, Dominic Duggan (Stevens Institute), Jan Vitek (Purdue University)

12:00 - 2:00

Lunch

2:00 - 3:00

Authorization and Security Policies
Session Chair: Heiko Mantel

Using First-Order Logic to Reason about Policies
Joseph Halpern, Vicky Weissman (Cornell University)

On Generalized Authorization Problems
Somesh Jha, Tom Reps (University of Wisconsin), Stefan Schwoon (Universitat Stuttgart), Stuart Stubblebine (Stubblebine Research Labs)

3:00 - 6:00

Trip to the Monterey Bay Aquarium

6:00 - 7:00

Dinner


WEDNESDAY July 2, 2003

9:00 - 10:30

Computational Analysis of Security Protocols
Session Chair: Jonathan Millen

Identity Based Authenticated Key Agreement Protocols from Pairings
Liqun Chen, Caroline Kudla (Hewlett-Packard Company)

The Diffie-Hellman Key-Agreement Scheme in the Strand Space Model
Jonathan Herzog (The MITRE Corporation)

A Computational Analysis of the Needham-Schroeder-(Lowe) Protocol

Bogdan Warinschi (University of California at San Diego) 

10:30 - 10:45

Break

10:45 - 11:45

Panel 2: A Tribute to Professor Roger Needham


Moderator:
Paul Syverson (Naval Research Laboratory)
Panel Members: Dieter Gollmann, Li Gong, and Cathy Meadows
 

11:45 - 12:00

Closing remarks. Presentation of awards

12:00

Lunch