LICS'04 and ICALP'04 Affiliated Workshop on

Foundations of Computer Security - FCS'04

Turku, Finland, July 12-13, 2004

Schedule
Monday, July 12
9:00 ICALP Opening
9:15 ICALP Invited talk: Philippe Flajolet
  FCS Start
10:15 FCS Opening
Andrei Sabelfeld, Chalmers University of Technology, Sweden

Mobility
10:20 Typing migration control in Lsdpi
Francisco Martins, Department of Mathematics, University of Azores
António Ravara, Department of Mathematics, Instituto Superior Técnico
10:50 Coffee break

Access Control
11:15 Model-checking Access Control Policies
Dimitar Guelev, University of Birmingham
Mark Ryan, University of Birmingham
Pierre Yves Schobbens, University of Namur
11:45 Inheritance hierarchies in the Or-BAC Model and application in a network environment
Frédéric Cuppens, ENST-Bretagne
Nora Cuppens-Boulahia, ENST-Bretagne
Alexandre Miège, ENST Paris
12:15 An Algebraic Approach to the Analysis of Constrained Workflow Systems
Jason Crampton, Royal Holloway, University of London
12:45 Lunch
14:00 ICALP Invited talk: Wojciech Rytter
  Security Protocols I
15:00 CPL: An Evidence-Based 5-Dimensional Logic for the Compositional Specification and Verification of Cryptographic Protocols. Part I: Language, Process Model, Satisfaction
Simon Kramer, Federal Institute of Technology in Lausanne, Switzerland
15:30 Non-monotonic Properties for Proving Correctness in a Framework of Compositional Logic
Koji Hasebe, Department of Philosophy, Keio University
Mitsuhiro Okada, Department of Philosophy, Keio University
16:00 Coffee break

Security Protocols II
16:30 A Synchronous Model for Multi-Party Computation and the Incompleteness of Oblivious Transfer
Dennis Hofheinz, Institut fuer Algorithmen und Kognitive Systeme, Universitaet Karlsruhe
Joern Mueller-Quade, Institut fuer Algorithmen und Kognitive Systeme, Universitaet Karlsruhe
17:00 Design of a CIL Connector to SPIN
Li Yongjian, Laboratory of Computer Science, Institute of Software, Chinese Academy of Sciences
Xue Rui, The State Key Laboratory of Information Security, Beijing, China
17:30 Speech Act Oriented Design of Key Exchange Protocol
Phan Minh Dung, Asian Institute of Technology, Thailand
Phan Minh Thang,
Asian Institute of Technology, Thailand
18:00 End
19:30 Reception


Tuesday, July 13
9:00 ICALP Invited talk: Monika Henzinger
  Language-based Security I
10:00 A Monadic Analysis of Information Flow Security with Mutable State
Karl Crary, Carnegie Mellon University
Aleksey Kliger, Carnegie Mellon University
Frank Pfenning, Carnegie Mellon University
10:30 Coffee break

Language-based Security II
11:00 A Modal Foundation for Secure Information Flow
Kenji Miyamoto, Graduate School of Informatics, Kyoto University
Atsushi Igarashi, Graduate School of Informatics, Kyoto University
11:30 Typing Noninterference for Reactive Programs
Ana Almeida Matos, INRIA Sophia-Antipolis
Gérard Boudol, INRIA Sophia-Antipolis
Ilaria Castellani, INRIA Sophia-Antipolis 
12:00 Principals, Policies and Keys in a Secure Distributed Programming Language
Tom Chothia, Stevens Institute of Technology

Dominic Duggan, Stevens Institute of Technology
Jan Vitek, Purdue University
12:30 Lunch
14:00 FCS Invited talk: Weak Secrets and Computational Soundness
Martín Abadi, University of California at Santa Cruz
14:45 Break

Sub-Workshop on Logical Foundations of an Adaptive Security Infrastructure (WOLFASI)
15:00 WOLFASI opening
Leo Marcus, The Aerospace Corporation
15:20
Practical and Theoretical Issues on Adaptive Security
Alexander Shnitko, Novosibirsk State Technical University
15:40
On Comparing the Expressive Power of Access Control Model Frameworks
Elisa Bertino, Purdue University
Barbara Catania, University of Genova
Elena Ferrari, University of Insubria
Paolo Perlasca, University of Milano
16:00 Coffee break
16:30
Formalizing an Adaptive Security Infrastructure in Mob_{adtl}
Carlo Montangero, University of  Pisa
Laura Semini, University of  Pisa
17:00 Towards an Algebraic Approach to Solve Policy Conflicts
Cataldo Basile, Politecnico di Torino
Antonio Lioy, Politecnico di Torino
17:30
Performance-sensitive Real-time Risk Management is NP-Hard
Ashish Gehani, Duke University
18:00 End



Andrei Sabelfeld, Last modified: May 24, 2004