|
> Congress / Final Programme / Workshops / Ws4
Ws4: Formal Aspects in Security and Trust (FAST)
26- 27 August 2004
http://www.iit.cnr.it/FAST2004
Room
Néouvielle on Thursday
Guillaumet 1 on Friday
General co-Chairs
Theo Dimitrakos (BITD-CCLRC, UK) and Fabio Martinelli (IIT-CNR, Italy)
Programme
Thursday, 26 August 2004
10h30 - 12h
Security and Noninterference
nvited Talk: Security Issues in the Tuple-space Coordination Model - Roberto Gorrieri (U. Bologna, Italy)
Information Flow Analysis for Probabilistic Timed Automata - Ruggero Lanotte (U. dell'Insubria, Italy), Andrea Maggiolo-Schettini, Angelo Troina (U. di Pisa, Italy)
Dynamic Security Labels and Noninterference - Lantian Zheng, Andrew Myers (Cornell U., USA)
13h30 - 15h
Formal Models for Security
Modelling Dynamic Opacity using Petri Nets with Silent Actions - Jeremy W. Bryans, Maciej Koutny, Peter Y.A. Ryan (U. Newcastle, UK)
Formal Analysis of a Fair Payment Protocol - Jan Cederquist, Muhammad Torabi Dashti (Centrum voor Wiskunde en Informatica, The Netherlands)
Pattern-Matching Spi-Calculus - Christian Haack, Alan Jeffrey (DePaul U., USA)
Decidability of Opacity with Non-Atomic Keys - Laurent Mazare (VERIMAG, France)
15h30 - 17h
Panel (joint with CSES Workshop)
Examining Trust Management Models from Different Perspectives
Moderator: Christos Nikolaou (U. Crete, Greece)
Participants: Theo Dimitrakos (BITD-CCLRC, UK), Christian Jensen (DTU, Denmark), Klaudia Keser (IBM, USA), Ketil Stølen (SINTEF ICT, Norway), William H. Winsborough (George Mason U., USA)
Friday, 27 August 2004
09h00 - 10h30
Security and Trust Management (I)
Invited Talk: An Overview of the iTrust Thematic Network - Christos Nikolaou (U. Crete, Greece)
Virtual Analysis and Reduction of Side-Channel Vulnerabilities of Smartcards - Jerry den Hartog (Twente U., The Netherlands), Erik de Vink (Technical U. Eindhoven, The Netherlands)
Family Secrets - James Heather, Jonathan Clark (U. Surrey, UK)
11h00 - 12h30
Security and Trust Management (II)
A Formal Model for Parameterised Role-Based Access Control - Ali E. Abdallah, Etienne J. Khayat (London South Bank U., UK)
An Interactive Trust Management and Negotiation Scheme - Hristo Koshutanski, Fabio Massacci (U. Trento, Italy)
Complementing Computational Protocol Analysis with Formal Specifications - Kim Kwang Choo, Colin Boyd, Yvonne Hitchcock, Greg Maitland (Information Security Research Centre, Australia)
A Trust Model with Statistical Foundation - Jianqiang Shi, Gregor Bochmann, Carlisle Adams (U. Ottawa, Canada)
14h00 - 15h30
Panel (joint with WS CSES Workshop)
Major Trust and Security Challenges for Business Centric Virtual Organizations
Moderator: Maurizio Talamo (U. Rome, Italy)
Participants: Franco Arcieri (NESTOR, Italy), Joris Claessens (Microsoft - EMIC, Germany), Theo Dimitrakos (CCLRC, UK), Dave Golby (BAE Systems, UK), Yücel Karabulut (SAP, Germany), Paul Kearney (BT, UK), Jakka Sairamesh (IBM, USA)
16h00 - 17h30
Access Control and Security Policies
Reasoning about Secure Interoperation using Soft Constraints - Stefano Bistarelli (CNR Pisa, Italy), Simon N. Foley, Barry O'Sullivan (U. College Cork, Ireland)
A Logic for Auditing Accountability in Decentralized Systems - Ricardo Corin, Jerry den Hartog, Gabriele Lenzini, Ioan Staicu (U. Twente, The Netherlands), Sandro Etalle (U. Twente, The Netherlands)
A Formal Approach to Specify and Deploy a Network Security Policy - Frédéric Cuppens, Nora Cuppens-Boulahia, Thierry Sans, Alexandre Miège (ENST Bretagne, France)
Discretionary Overriding of Access Control in the Privilege Calculus - Erik Rissanen, Babak Sadighi Firozabadi (Swedish Institute of Computer Science, Sweden), Marek Sergot (U. London, UK)

|