Program of the 7th IEEE Computer Security Foundations Workshop (CSFW-7) Franconia, New Hampshire, June 14-16, 1994 Tuesday, June 14 8:50-9:00am -- Welcoming Remarks Ravi Sandhu (George Mason University, General Chair) Li Gong (SRI, Program Chair) 9:00-10:30am -- Non-Interference and Composability Session chair: Jose Meseguer (SRI) * Unwinding Forward Correctability Jonathan Millen (MITRE) * A State-Based Approach to Non-Interference William Young and William Bevier (Computational Logic, Inc.) * Combining Components and Policies George Dinolt, Lee Benzinger and Mark Yatabe (Loral) 10:30-11:00am -- Coffee Break 11:00-12:00pm -- Formal Methods and Semantics Session chair: Simon Foley (University College, Cork) * Formal Methods for the Informal World Carol Muehrcke (Secure Computing Corporation) * Formal Semantics of Rights and Confidentiality in Deductive Databases with General Integrity Constraints Adrian Spalka (University of Bonn) 12:00-2:00pm -- Lunch Break and Croquet Tournament 2:00-3:00pm -- Model(l)ing Session chair: Stewart Lee (University of Toronto) * Confidentiality in a Replicated Architecture Trusted Database System: A Formal Model Oliver Costich, John McLean and John McDermott (Naval Research Lab) * Conceptual Foundations for a Model of Task-based Authorizations Ravi Sandhu and Roshan Thomas (George Mason University) 3:00-3:30pm -- Coffee Break 3:30-5:00pm -- Panel on "The General Write-Up Problem" Panelists: John McDermott (NRL), Rashan Thomas (GMU), Ira Moskowitz (NRL), and Oliver Costich (NRL) Wensdesday, June 15 9:00-10:30am -- Cryptographic Protocol Analysis Session chair: Virgil Gligor (University of Maryland) * A Model of Computation for the NRL Protocol Analyzer Catherine Meadows (Naval Research Lab) * AUTLOG -- An Advanced Logic of Authentication Volker Kessler and Gabriele Riemer (Siemens, AG) * Nonmonotonic Cryptographic Protocols Aviel Rubin and Peter Honeyman (University of Michigan) 10:30-11:00am -- Coffee Break 11:00-12:00pm -- Security Policies Session chair: John McLean (Naval Research Lab) * Formal Specification of Information Flow Security Policies and Their Enforcement in Security Critical Systems Ramesh Peri and William Wulf (University of Virginia) * A Taxonomy of Security Properties for CCS Roberto Gorrieri and Riccardo Focardi (Universita di Bologna) 12:00-2:00pm -- Lunch Break and Croquet Tournament 2:00-3:00pm -- Access Control Session chair: Joshua Guttman (MITRE) * One-Representative Safety Analysis in the Non-Monotonic Transform Model Ravi Sandhu and Paul Ammann (George Mason University) * Reasoning about Confidentiality Requirements Simon Foley (University College Cork, Ireland) 3:00-3:30pm -- Coffee Break 3:30-5:00pm -- Panel on "Reconsidering the Role of the Reference Monitor" * Redrawing the Security Perimeter of a Trusted System Dan Sterne, Glen Benson, and Homayoon Tajalli (Trusted Information Systems) Panelists: Dan Sterne (moderator), Len LaPadula (MITRE), Ravi Sandhu (GMU), Carl Landwehr (NRL), and Glenn Benson Thursday, June 16 9:00-10:30am -- Protocol Security Session chair: Michael Merritt (AT&T Bell Labs) * Development of Authentication Protocols: Some Misconceptions and a New Approach Wenbo Mao and Colin Boyd (University of Manchester) * A Taxonomy of Replay Attacks Paul Syverson (Naval Research Lab) * Cryptographic Protocols Flaws Ulf Carlsen (Telecom Bretagne, France) 10:30-11:00am -- Coffee Break 11:00-12:00pm -- Workshop Business Meeting 12:00pm -- Workshop Adjourns