Programme of WITS at ETAPS 2006

(Sixth Workshop on Issues in the Theory of Security)

Saturday, March 25

09:30 - 10:30 SESSION 1 (WITS, Saturday, March 25, room: EI 8)

Opening Keynote (chairs: Dieter Gollmann and Jan Jürjens)
Limits of the Soundness of Dolev-Yao Models
Birgit Pfitzmann (IBM Zurich Research Lab)

10:30 - 11:00 Coffee

11:00 - 12:30 SESSION 2 (WITS, Saturday, March 25, room: EI 8)

Composition, Abstraction, and Access Control
Plans for Service Composition
Massimo Bartoletti, Pierpaolo Degano, and Gian Luigi Ferrari (Univ. of Pisa, I)
Incremental Certificates and Checkers for Abstraction-Carrying Code
Elvira Albert, Puri Arenas (Complutense Univ. of Madrid, E), and German Puebla (Technical Univ. of Madrid)
Event Systems and Access Control
Dominique Mery (Univ. Henri Poincare and LORIA, F) and Stephan Merz (INRIA Lorraine and LORIA, F)

12:30 - 14:00 Lunch

14:00 - 15:30 SESSION 3 (WITS, Saturday, March 25, room: EI 8)

Applications (chair: Dieter Gollmann)
Breaking and Fixing Public-Key Kerberos
Iliano Cervesato, Aaron D. Jaggard (Tulane Univ., USA); Andre Scedrov, Joe-Kai Tsay, and Chris Walstad (Univ. of Pennsylvania, USA)
Analyzing for Absence of Timing Leaks in VHDL
Terkel K. Tolstrup and Flemming Nielson (Technical Univ. of Denmark, DK)
Defending the Bank with a Proof Assistant
Judicael Courant and Jean-Francois Monin (Univ. Joseph Fourier and VERIMAG, F)

15:30 - 16:00 Coffee

16:00 - 18:00 SESSION 4 (WITS, Saturday, March 25, room: EI 8)

Process Algebras
Formal Verification of the ARAN Protocol Using the Applied Pi-Calculus
Jens Chr. Godskesen (IT Univ. of Copenhagen, DK)
Authentication and Sandboxing in a Distributed Pi-Calculus
Hans Huttel and Morten Kuhnrich (Aalborg Univ., DK)
Modeling Security Automata with Process Algebras and Related Results
Fabio Martinelli and Ilaria Matteucci (IIT-CNR, I)
An Operational Semantics for Trust Policies
Karl Krukow (BRICS, University of Aarhus, DK)

Sunday, March 26

09:30 - 10:30 SESSION 1 (WITS, Sunday, March 26, room: EI 8)

Keynote (chair: Jan Jürjens)
If the Internet is broken, what can we do to fix it?
Pieter Hartel (Univ. of Twente, NL)

10:30 - 11:00 Coffee

11:00 - 12:30 SESSION 2 (WITS, Sunday, March 26, room: EI 8)

Noninterference and Computational Justifications
Noninterference and the Most Powerful Probabilistic Adversary
Alessandro Aldini (Univ. of Urbino Carlo Bo, I) and Alessandra Di Pierro (Univ. of Pisa, I)
Non-Interference and Erasure Policies for Java Card Bytecode
Rene Rydhof Hansen and Christian W. Probst (Technical Univ. of Denmark, DK)
A Computational Justification for Guessing Attack Formalisms
Tom Newcomb and Gavin Lowe (Univ. of Oxford, UK)

12:30 - 14:00 Lunch

14:00 - 15:30 SESSION 3 (WITS, Sunday, March 26, room: EI 8)

Keynote (chair: Jan Jürjens)
Topic to be announced
David Sands (Chalmers Univ. of Technology and Univ. of Göteborg, S)
Anonymity (chair: Jan Jürjens)
Backward Simulations for Anonymity
Yoshinobu Kawabe, Ken Mano, Hideki Sakurada, and Yasuyuki Tsukada (NTT Corporation)

15:30 - 16:00 Coffee

16:00 - 17:30 SESSION 4 (WITS, Sunday, March 26, room: EI 8)

Verification (chair: Pierpaolo Degano)
A Unification-Based Decision Procedure for Cryptographic Protocol Analysis
Deepak Bhardwaj and Deepak D'Souza (Indian Inst. of Science, Bangalore, IND)
Closing Keynote (chair: Pierpaolo Degano)
Automated Validation of Internet Security Protocols: Present and Future
Luca Vigano (ETH Zurich, CH)

17:30 - 18:30 IFIP WG 1.7 Meeting (internal)

19:30 SOCIAL EVENT (Sunday, March 26)

Joint Workshops Pre-Conference Dinner
Dinner at the historic restaurant Piaristenkeller, Piaristengasse 45, 1080 Wien

Further ETAPS 2006 Programme Information:

ETAPS 2006 | Top | HTML 4.01 | Last Update: 2006-03-25