The 4th ACM Workshop on
Formal Methods in Security Engineering
Friday Nov. 3, 2006, Johnson Center,
George Mason University, Fairfax, Virginia, USA
-
8.50am – 9.00am
- Welcome
D. Sands
- 9.00am – 10.30am
- Session 1 Session Chair: A. D. Gordon
-
Invited Talk Searching for shapes
J. Guttman (Mitre Corporation)
- Securing the Drop-Box Architecture for Assisted Living
M. J. May (University of Pennyslvania),
W. Shin, C. A. Gunter (University of Illinois at Urbana-Champaign),
I. Lee (University of Pennyslvania)
- 10.30am – 11.00am
- Break
- 11.00am – 12.30pm
- Session 2 Session Chair: TBA
-
P-Congruences as Non-Interference for the π-calculus
S. Crafa (Università di Padova), S. Rossi (Università Ca'Foscari di Venezia)
-
An Intruder Model for Verifying Liveness in Security Protocols
J. Cederquist (University of Twente),
M. T. Dashti (Centrum voor Wiskunde en Informatica)
-
Secure Information Flow with Random Assignment and Encryption
G. Smith, R. Alpízar (Florida International University)
- 12.30 – 2.00pm
- Lunch
- 2.00pm – 3.30pm
- Session 3 Session Chair: D. Sands
-
Invited Talk
Encoding Information Flow in Haskell
S. Zdancevic (University of Pennsylvania)
-
Defeasible Security Policy Composition for Web Services
A. J. Lee, J. P. Boyer, L. E. Olson, C. A. Gunter (University of Illinois at Urbana-Champaign)
- 3.30pm – 4.00pm
- Break
- 4.00pm – 5.00pm
- Session 4 Session Chair: TBA
-
NETRA: Seeing Through Access Control
P. Naldurg (Microsoft Research India), S. Schwoon (Universität Stuttgart),
S. Rajamani (Microsoft Research India), J. Lambert (Microsoft Corporation)
- Bridging the Gap Between Web Application Firewalls and Web Applications
L. Desmet, F. Piessens, W. Joosen, P. Verbaeten (Katholieke Universiteit Leuven)
- 5.00pm
- Closing
A. D. Gordon