Programme of WITS at ETAPS 2006
Saturday, March 25
09:30 - 10:30 SESSION 1 (WITS, Saturday, March 25, room: EI 8)
- Opening Keynote (chairs: Dieter Gollmann and Jan Jürjens)
- Limits of the Soundness of Dolev-Yao Models
- Birgit Pfitzmann (IBM Zurich Research Lab)
10:30 - 11:00 Coffee
11:00 - 12:30 SESSION 2 (WITS, Saturday, March 25, room: EI 8)
- Composition, Abstraction, and Access Control
- Plans for Service Composition
- Massimo Bartoletti, Pierpaolo Degano, and Gian Luigi Ferrari (Univ. of Pisa, I)
- Incremental Certificates and Checkers for Abstraction-Carrying Code
- Elvira Albert, Puri Arenas (Complutense Univ. of Madrid, E), and German Puebla (Technical Univ. of Madrid)
- Event Systems and Access Control
- Dominique Mery (Univ. Henri Poincare and LORIA, F) and Stephan Merz (INRIA Lorraine and LORIA, F)
12:30 - 14:00 Lunch
14:00 - 15:30 SESSION 3 (WITS, Saturday, March 25, room: EI 8)
- Applications (chair: Dieter Gollmann)
- Breaking and Fixing Public-Key Kerberos
- Iliano Cervesato, Aaron D. Jaggard (Tulane Univ., USA); Andre Scedrov, Joe-Kai Tsay, and Chris Walstad (Univ. of Pennsylvania, USA)
- Analyzing for Absence of Timing Leaks in VHDL
- Terkel K. Tolstrup and Flemming Nielson (Technical Univ. of Denmark, DK)
- Defending the Bank with a Proof Assistant
- Judicael Courant and Jean-Francois Monin (Univ. Joseph Fourier and VERIMAG, F)
15:30 - 16:00 Coffee
16:00 - 18:00 SESSION 4 (WITS, Saturday, March 25, room: EI 8)
- Process Algebras
- Formal Verification of the ARAN Protocol Using the Applied Pi-Calculus
- Jens Chr. Godskesen (IT Univ. of Copenhagen, DK)
- Authentication and Sandboxing in a Distributed Pi-Calculus
- Hans Huttel and Morten Kuhnrich (Aalborg Univ., DK)
- Modeling Security Automata with Process Algebras and Related Results
- Fabio Martinelli and Ilaria Matteucci (IIT-CNR, I)
- An Operational Semantics for Trust Policies
- Karl Krukow (BRICS, University of Aarhus, DK)
Sunday, March 26
09:30 - 10:30 SESSION 1 (WITS, Sunday, March 26, room: EI 8)
- Keynote (chair: Jan Jürjens)
- If the Internet is broken, what can we do to fix it?
- Pieter Hartel (Univ. of Twente, NL)
10:30 - 11:00 Coffee
11:00 - 12:30 SESSION 2 (WITS, Sunday, March 26, room: EI 8)
- Noninterference and Computational Justifications
- Noninterference and the Most Powerful Probabilistic Adversary
- Alessandro Aldini (Univ. of Urbino
Carlo Bo
, I) and Alessandra Di Pierro (Univ. of Pisa, I)
- Non-Interference and Erasure Policies for Java Card Bytecode
- Rene Rydhof Hansen and Christian W. Probst (Technical Univ. of Denmark, DK)
- A Computational Justification for Guessing Attack Formalisms
- Tom Newcomb and Gavin Lowe (Univ. of Oxford, UK)
12:30 - 14:00 Lunch
14:00 - 15:30 SESSION 3 (WITS, Sunday, March 26, room: EI 8)
- Keynote (chair: Jan Jürjens)
- Topic to be announced
- David Sands (Chalmers Univ. of Technology and Univ. of Göteborg, S)
- Anonymity (chair: Jan Jürjens)
- Backward Simulations for Anonymity
- Yoshinobu Kawabe, Ken Mano, Hideki Sakurada, and Yasuyuki Tsukada (NTT Corporation)
15:30 - 16:00 Coffee
16:00 - 17:30 SESSION 4 (WITS, Sunday, March 26, room: EI 8)
- Verification (chair: Pierpaolo Degano)
- A Unification-Based Decision Procedure for Cryptographic Protocol Analysis
- Deepak Bhardwaj and Deepak D'Souza (Indian Inst. of Science, Bangalore, IND)
- Closing Keynote (chair: Pierpaolo Degano)
- Automated Validation of Internet Security Protocols: Present and Future
- Luca Vigano (ETH Zurich, CH)
17:30 - 18:30 IFIP WG 1.7 Meeting (internal)
19:30 SOCIAL EVENT (Sunday, March 26)
- Joint Workshops Pre-Conference Dinner
- Dinner at the historic restaurant Piaristenkeller, Piaristengasse 45, 1080 Wien
Further ETAPS 2006 Programme Information:
- Programme Overview
- Main Conferences:
Complete Programme,
CC,
ESOP,
FASE,
FOSSACS,
TACAS
- Workshops:
ACCAT,
AVIS,
CMCS,
COCV,
DCC,
EAAI,
FESCA,
FRCSS,
GT-VMT,
LDTA,
MBT,
QAPL,
SC,
SLAP,
SPIN,
TERMGRAPH,
WRLA
- Tutorials:
Phoenix,
QuantComp
ETAPS 2006 |
Top |
HTML 4.01 |
Last Update: 2006-03-25