![]() |
Program18th IEEE Computer Security Foundations WorkshopJune 20 - 22, 2005 Aix-en-Provence, France Sponsored by the Technical Committee on Security and Privacy of the IEEE Computer Society |
|
| 9:00 | Practical Information-flow Control in Web-based Information Systems |
| Peng Li and Steve Zdancewic | |
| 9:30 | Achieving Information Flow Security Through Precise Control of Effects |
| William Lawrence Harrison and James Hook | |
| 10:00 | Belief in Information Flow |
| Michael R. Clarkson, Andrew C. Myers and Fred B. Schneider |
| 11:15 | An Encapsulated Authentication Logic for Reasoning About Key Distribution Protocol |
| Iliano Cervesato, Catherine Meadows, and Dusko Pavlovic | |
| 11:45 | Deciding knowledge in security protocols under (many more) equational theories |
| Martìn Abadi and Véronique Cortier |
| 14:30 | A Cryptographically Sound Dolev-Yao Style Security Proof of an Electronic Payment System |
| Michael Backes and Markus Dürmuth | |
| 15:00 | Compositional Analysis of Contract Signing Protocols |
| Michael Backes, Anupam Datta, Ante Derek, John C. Mitchell, and Mathieu Turuani |
| 9:00 | Analysis of Type-based Analyses of Authentication Protocols |
| M. Bugliesi, R. Focardi, and M. Maffei | |
| 9:30 | Temporal Rank Functions for Forward Secrecy |
| Rob Delicata and Steve Schneider | |
| 10:00 | Reconstruction of Attacks against Cryptographic Protocols |
| Xavier Allamigeon and Bruno Blanchet |
| 11:15 | Polynomial Runtime in Simulatability Definitions |
| Dennis Hofheinz, Jörn Müller-Quad, and Dominique Unruh | |
| 11:45 | Computational and Information-Theoretic Soundness and Completeness of Formal Encryption |
| Pedro Adão, Gergei Bana, and Andre Scedrov |
| 14:30 | Nomad: A Security Model with Non Atomic Actions and Deadlines |
| Frédéric Cuppens, Nora Cuppens-Boulahia, and Thierry Sans | |
| 15:00 | Type annotation for stack-based access control |
| Tian Zhao | |
| 15:30 | Enforcing Secure Service Composition |
| Massimo Bartoletti, Pierpaolo Degano, and Gian-Luigi Ferrari |
| 9:00 | On Declassification and the Non-Disclosure Policy |
| Gerard Boudol and Ana Matos | |
| 9:30 | Language-Based Information Erasure |
| Stephen Chong and Andrew C. Myers | |
| 10:00 | Dimensions and Principles of Declassification |
| Andrei Sabelfeld and David Sands |
| 11:15 | End-to-end Availability Policies and Noninterference |
| Lantian Zheng and Andrew C. Myers | |
| 11:45 | Game-Based Analysis of Denial-of-Service Prevention Protocols |
| Ajay Mahimkar and Vitaly Shmatikov |
There are PDF and plain text versions of this programs.
For further information contact:
| General Chair | Program Chair | Publications Chair |
| Roberto Amadio
CMI, 39 rue Joliot-Curie 13453, Marseille Cedex 13 France +33 4 91 11 36 14 amadio@cmi.univ-mrs.fr | Joshua Guttman
The MITRE Corporation 202 Burlington Rd Bedford, MA 01730 USA +1 781 271 2654 guttman@mitre.org | Jonathan Herzog
The MITRE Corporation 202 Burlington Rd Bedford, MA 01730 USA +1 781 271 7281 jherzog@mitre.org |