| 6:30 - 7:30 | Reception and Registration | 
| 8:45 - 9:00 | Welcome Iliano Cervesato (Naval Research Laboratory), General Chair Steve Schneider (Royal Holloway, University of London), Program Chair | 
| 9:00 - 10:00 | Noninterference and Information Flow Session Chair: John McLean Noninterference Equations for Nondeterminsitic Systems
 Robust Declassification
 | 
| 10:00 - 10:30 | Break | 
| 10:30 - 12:00 | Access Control Session Chair: Ravi Sandhu A state-transition model of trust management and access control
 Revocations - a Classification
 A Logical Reconstruction of SPKI
 | 
| 12:00 - 2:00 | Lunch | 
| 2:00 - 3:30 | Protocols I Session Chair: Gavin Lowe A Security Analysis of the Cliques Protocols Suites
 An Efficient Protocol Verifier Based on Prolog Rules
 Proving Secrecy is Easy Enough
 | 
| 3:30 - 4:00 | Break | 
| 4:00 - 5:15 | Panel: Relating Cryptography and Cryptographic Protocols Panel Chair: Andre Scedrov (University of Pennsylvania) Panelists: Martin Abadi (Intertrust) Ran Canetti (IBM Yorktown) Joshua Guttman (MITRE) David Wagner (University of California, Berkeley) | 
| 5:30 - 8:00 | Whale watching excursion | 
| 9:00 - 10:00 | Information Flow and Multi-threading Session Chair: Riccardo Focardi A New Type System for Secure Information Flow
 A Generic Approach to the Security of Multi-threaded Programs
 | 
| 10:00 - 10:30 | Break | 
| 10:30 - 12:00 | Protocols II Session Chair: Andre Scedrov Computing Symbolic Models for Verifying Cryptographic Protocols
 Protocol Insecurity with Finite Number of Sessions is NP-complete
 | 
| 12:00 - 2:00 | Lunch | 
| 2:00 - 3:30 | Intrusion Tolerance and Detection Session Chair: Dieter Gollmann Multi-phase Damage Confinement in Database Systems for Intrusion Tolerance
 Markov Chains, Classifiers, and Intrusion Detection
 Log Auditing through Model-Checking
 | 
| 3:30 - 4:00 | Break | 
| 4:00 - 5:00 | Panel: Non-interference: who needs it? Panel Chair: Peter Ryan (Carnegie Mellon University) Panelists: Jon Millen (SRI) John McLean (NRL) Virgil Gligor (University of Maryland) | 
| 5:30 - 6:00 | Business Meeting | 
| 9:00 - 10:00 | Logics for Protocol Verification Session Chair: Fabio Martinelli A Compositional Logic for Protocol Correctness
 Logical Relations for Encryption
 | 
| 10:00 - 10:30 | Break | 
| 10:30 - 12:00 | Secrecy and Privacy Session Chair: Rebecca Wright Privacy-preserving Cooperative Scientific Computations
 Confined Mobile Functions
 Confidentiality-preserving Refinement
 | 
| 12:00 - 12:15 | Closing remarks. Presentation of Croquet Awards Lunch |