17th IEEE Computer Security Foundations Workshop

28 - 30 June, 2004

Asilomar Conference Center

Technical Program

SUNDAY June 27, 2004

6:00 - 7:00

Dinner


MONDAY June 28, 2004

8:45 - 9:00

WELCOME
George Dinolt (Naval Postgraduate School), General Chair
Riccardo Focardi (University of Venice), Program Chair

9:00 - 10:30

Protocols I
Session Chair: Jon Millen

A Theory of Dictionary Attacks and its Complexity
Stephanie Delaune, Florent Jacquemard (Laboratoire Spécification et Vérification)

Generic Insecurity of Cliques-Type Authenticated Group Key Agreement Protocols
Olivier Pereira, Jean-Jacques Quisquater (UCL Crypto Group)

Abstraction and Refinement in Protocol Derivation
Anupam Datta, Ante Derek, John Mitchell (Stanford University),
Dusko Pavlovic (Kestrel Institute)

10:30 - 11:00

Break

11:00 - 12:00

Access Control
Session Chair:
Andre Scedrov

A Distributed Calculus for Role-Based Access Control
Chiara Braghin (Universita' Ca' Foscari di Venezia), Daniele Gorla (Universita' di Firenze), Vladimiro Sassone (University of Sussex)

From Stack Inspection to Access Control: A Security Analysis for Libraries
Frederic Besson (Microsoft Research), Tomasz Blanc (INRIA), Cedric Fournet, Andrew Gordon (Microsoft Research)

12:00 - 2:00

Lunch

2:00 - 3:00

Intrusion Detection
Session Chair: Catherine Meadows

Selecting Appropriate Counter-Measures in an Intrusion Detection Framework
Frédéric Cuppens, Thierry Sans, Sylvain Gombault (ENST Bretagne)

Using Active Learning in Intrusion Detection
Magnus Almgren, Erland Jonsson (Chalmers University)

3:00 - 3:30

Break

3:30 – 4:30

Information Flow
Session Chair: Andrew Myers

Secure Information Flow by Self-Composition
Gilles Barthe (INRIA Sophia-Antipolis), Pedro R. D'Argenio (Université de Provence), Tamara Rezk (INRIA Sophia-Antipolis)

Lenient Array Operations for Practical Secure Information Flow
Zhenyue Deng, Geoffrey Smith (Florida International University)

4:30 – 5:30

Business meeting

6:00 - 7:00

Dinner


TUESDAY June 29, 2004

9:00 - 10:30

Security Policies
Session Chair:
Andy Gordon

Owned Policies for Information Security
Hubie Chen, Stephen Chong (Cornell University)

Cassandra: Flexible Trust Management, Applied to Electronic Health Records
Moritz Y. Becker, Peter Sewell (Computer Laboratory, University of Cambridge)

The Consistency of Task-Based Authorization Constraints in Workflow Systems
Kaijun Tan (University of Pennsylvania), Jason Crampton (Royal Holloway, University of London), Carl Gunter (University of Pennsylvania)

10:30 - 11:00

Break

11:00 - 12:00

Declassification & Information Flow
Session Chair: Heiko Mantel

Enforcing Robust Declassification
Andrew Myers (Cornell University), Andrei Sabelfeld (Chalmers University of Technology), Steve Zdancewic (University of Pennsylvania)

Modelling Downgrading in Information Flow Security
Annalisa Bossi, Carla Piazza, Sabina Rossi (Universita' Ca' Foscari di Venezia, Italy)

12:00 - 2:00

Lunch

2:00 - 3:00

Formal Methods & Cryptography
Session Chair:
John Mitchell

Symmetric Encryption in a Simulatable Dolev-Yao Style Cryptographic Library
Michael Backes, Birgit Pfitzmann (IBM Zurich Research Laboratory)

On Universally Composable Notions of Security for Signature, Certification and Authentication
Ran Canetti (IBM Research)

3:00 - 3:30

Break

3:30 - 5:00

Panel: Formal Methods & Cryptography
Panel Chair: Cathy Meadows (Naval Research Laboratory)
Panelists: Ran Canetti, Michael Backes, and Andre Scedrov

6:00 - 7:00

Dinner


WEDNESDAY June 30, 2004

9:00 – 10:00

Authorization
Session Chair:
Geoff Smith

By Reason and Authority: A System for Authorization of Proof-Carrying Code
Nathan Whitehead, Martín Abadi (University of California, Santa Cruz), George Necula (University of California, Berkeley)

A Formal Foundation for XrML Licenses
Joseph Halpern, Vicky Weissman (Cornell University)

10:00 – 10:30

Break

10:30 - 11:30

Protocols II
Session Chair: Michael Backes

Formal analysis of multi-party contract signing
Rohit Chadha (University of Sussex), Steve Kremer (Université Libre de Bruxelles), Andre Scedrov (University of Pennsylvania)

Symbolic Model Checking the Knowledge of the Dining Cryptographers
Kaile Su (Zhongshan University, China), Ron van der Meyden (University of New South Wales, Sydney)

11:30 – 11:45

Closing remarks. Presentation of awards
PC Statistics (Focardi)

12:00

Lunch