9.30 - 10.00 Joshua D. Guttman,
F. Javier Thayer Fábrega:
Paths through Well-Behaved Bundles
10.00 - 10.30 Nancy Durgin, John Mitchell,
Dusko Pavlovic:
Protocol composition and correctness
_____________________
COFFEE BREAK
_____________________
11.00 - 11.30 H. R. Nielson, F. Nielson:
Hardest Attackers
11.30 - 12.00 Francesca Levi, Chiara
Bodei:
Security Analysis for Mobile Ambients
_____________________
LUNCH
_____________________
14.30 - 15.00 Michele Bugliesi, Giuseppe
Castagna:
Secure Safe Ambients and JVM Security
15.00 - 15.30 Dilsun Kirli:
Mobile Functions and Secure Information Flow
_____________________
COFFEE BREAK
_____________________
16.00 - 16.30 Carsten Rudolph:
Considering non-malleability in formal models
for cryptographic protocols
16.30 - 17.00 O. Pereira, J.-J. Quisquater:
On the Perfect Encryption Assumption
17.00 - 17.30 Serge Vaudenay:
Decorrelation: a new Theory for the Security
of Conventional Encryption
9.00 - 9.30 R. Amadio,
D. Lugiez, V. Vanackere:
On the Reachability Problem in Cryptographic Protocols
9.30 - 10.00 Stéphanie
Motré:
A B Automaton for Authentication Process
_____________________
COFFEE BREAK
_____________________
10.30 - 11.00 Chiara Polloni, Corrado
Priami:
Discretionary Access Control with Code Migration
11.00 - 11.30 Riccardo Focardi, Roberto
Gorrieri, Roberto Segala:
A New Definition of Multilevel Security
11.30 - 12.00 Fabio Martinelli:
Towards automatic synthesis of systems
without information flows
_____________________________
LUNCH & BUSINESS MEETING
_____________________________
14.00 - 14.30 Gianluigi Ferrari, Carlo
Montangero,
Laura Semini, Simone Semprini:
Multiple Security Policies in Mob_{adtl}
14.30 - 15.00 A. Di Pierro, C. Hankin,
H. Wiklicky:
Probabilistic Security Analysis in a Declarative Framework
_____________________
COFFEE BREAK
_____________________
15.30 - 16.00 Paul Syverson, Catherine
Meadows, Iliano Cervesato:
Dolev-Yao is no better than Machiavelli
16.00 - 16.30 Steve Kremer, Jean-François
Raskin:
A Game Approach to the Verification of Exchange Protocols -
Application to Non-Repudiation Protocols
16.30 - 17.00 D. Clark, Ch. Hankin,
S. Hunt, R. Nagarajan:
Possibilistic Information Flow is safe for Probabilistic Non-Interference