Monday, July 12
9:00 |
ICALP Opening |
9:15 |
ICALP Invited talk: Philippe
Flajolet |
|
FCS Start
|
10:15 |
FCS
Opening
Andrei Sabelfeld,
Chalmers University of Technology, Sweden
|
|
Mobility
|
10:20 |
Typing migration control in Lsdpi
Francisco Martins,
Department of Mathematics, University of Azores
António Ravara,
Department of Mathematics, Instituto Superior Técnico
|
10:50 |
Coffee break |
|
Access Control |
11:15 |
Model-checking Access Control Policies
Dimitar Guelev,
University of Birmingham
Mark Ryan, University of
Birmingham
Pierre Yves Schobbens,
University of Namur
|
11:45 |
Inheritance hierarchies in the Or-BAC Model
and application in a network environment
Frédéric
Cuppens, ENST-Bretagne
Nora Cuppens-Boulahia,
ENST-Bretagne
Alexandre Miège,
ENST Paris
|
12:15 |
An Algebraic Approach to the Analysis of
Constrained Workflow Systems
Jason Crampton, Royal
Holloway, University of London
|
12:45 |
Lunch |
14:00 |
ICALP Invited talk: Wojciech
Rytter |
|
Security Protocols I |
15:00 |
CPL: An Evidence-Based 5-Dimensional Logic
for the Compositional Specification
and Verification of Cryptographic Protocols. Part I: Language, Process
Model,
Satisfaction
Simon Kramer, Federal
Institute of Technology in Lausanne, Switzerland
|
15:30 |
Non-monotonic Properties for Proving
Correctness in a Framework of
Compositional Logic
Koji Hasebe, Department
of Philosophy, Keio University
Mitsuhiro Okada,
Department of Philosophy, Keio University
|
16:00 |
Coffee break |
|
Security Protocols II |
16:30 |
A Synchronous Model
for Multi-Party Computation and the Incompleteness of Oblivious Transfer
Dennis Hofheinz, Institut
fuer Algorithmen und Kognitive Systeme, Universitaet Karlsruhe
Joern Mueller-Quade,
Institut fuer Algorithmen und Kognitive Systeme, Universitaet Karlsruhe |
17:00 |
Design of a CIL Connector to SPIN
Li Yongjian, Laboratory
of Computer Science, Institute of Software, Chinese Academy of Sciences
Xue Rui, The State Key Laboratory of Information Security, Beijing,
China
|
17:30 |
Speech Act Oriented Design of Key Exchange
Protocol
Phan Minh Dung, Asian
Institute of Technology, Thailand
Phan Minh Thang, Asian
Institute of Technology, Thailand
|
18:00 |
End |
19:30 |
Reception |
Tuesday, July 13
9:00 |
ICALP Invited talk: Monika
Henzinger |
|
Language-based Security I
|
10:00 |
A Monadic Analysis of Information Flow
Security with Mutable State
Karl Crary,
Carnegie Mellon University
Aleksey Kliger, Carnegie
Mellon University
Frank Pfenning, Carnegie
Mellon University
|
10:30 |
Coffee break |
|
Language-based Security
II |
11:00 |
A Modal Foundation for Secure Information
Flow
Kenji Miyamoto, Graduate
School of Informatics, Kyoto University
Atsushi Igarashi,
Graduate School of Informatics, Kyoto University
|
11:30 |
Typing Noninterference for Reactive Programs
Ana Almeida Matos, INRIA
Sophia-Antipolis
Gérard Boudol,
INRIA Sophia-Antipolis
Ilaria Castellani, INRIA
Sophia-Antipolis |
12:00 |
Principals, Policies and Keys in a Secure
Distributed Programming Language
Tom Chothia, Stevens Institute of Technology
Dominic Duggan, Stevens
Institute of Technology
Jan Vitek, Purdue
University
|
12:30 |
Lunch |
14:00 |
FCS
Invited talk: Weak Secrets and
Computational Soundness
Martín Abadi,
University of California at Santa Cruz |
14:45 |
Break
|
|
Sub-Workshop on Logical Foundations of an
Adaptive Security Infrastructure (WOLFASI)
|
15:00 |
WOLFASI
opening
Leo Marcus, The
Aerospace Corporation
|
15:20
|
Practical and Theoretical Issues on
Adaptive Security
Alexander Shnitko,
Novosibirsk State Technical University
|
15:40
|
On Comparing the Expressive Power of Access
Control Model Frameworks
Elisa Bertino, Purdue
University
Barbara Catania,
University of
Genova
Elena Ferrari, University
of
Insubria
Paolo Perlasca,
University
of Milano
|
16:00 |
Coffee break |
16:30
|
Formalizing an Adaptive Security
Infrastructure in Mob_{adtl}
Carlo Montangero,
University of Pisa
Laura Semini, University
of Pisa
|
17:00 |
Towards an Algebraic Approach to Solve
Policy Conflicts
Cataldo Basile, Politecnico di Torino
Antonio Lioy, Politecnico di Torino
|
17:30
|
Performance-sensitive Real-time Risk
Management is NP-Hard
Ashish Gehani, Duke
University
|
18:00 |
End |
|