Re: CRIME WITS '02 Call for Participation (fwd)

From: Alan (alan@private)
Date: Wed Dec 05 2001 - 23:27:50 PST

  • Next message: George Heuston: "CRIME FW: NIPC Daily Report, 6 December 2001"

    On Wednesday 05 December 2001 12:12, Sarah Mocas wrote:
    > For all interested, there will be an international workshop
    > on issues in the theory of computer security held in Portland
    > this January.  The registration info on the site listed below
    > has registration at $140 to $170 depending on affiliations and
    > deadlines.  This type of conference is heavy on formal logics
    > and mathematical models but will still present good insight into
    > protocol analysis in general.  Some of the papers should be
    > available at author's web sites if you are interested.
    
    
    Yeah, but what if you can't afford the $140-170?  I have no corporate 
    interest paying my way. (The economy makes paupers of us all.)
    
    Is there a "poverty stricken Portlander" rate?
    
    >
    > Sarah
    >
    > > ------------------------------------------------------------
    > >
    > > 		   Call for Participation
    > >
    > > 			 Workshop 
    > > 		      on Issues in the
    > > 		     Theory of Security
    > > 			 (WITS '02)
    > > 	<URL:http://www.dsi.unive.it/IFIPWG1_7/wits2002.html>
    > >
    > > 		    Portland Oregon, USA
    > > 		     January 14-15 2002
    > >
    > > 		 Co-located with POPL '02,
    > > 	       the 29th Annual ACM Symposium
    > > 	   on Principles of Programming Languages
    > > 		    (January 16-18 2002)
    > > 		  Register through POPL at
    > >        <URL:http://www.cse.ogi.edu/PacSoft/conf/popl/index.htm>
    > > ------------------------------------------------------------
    > >
    > > Preliminary Program
    > >
    > > Monday, 14 January 2002
    > >
    > > Session I: Security Properties
    > >
    > >    o Vitaly Shmatikov, Dominic J.D. Hughes. Defining
    > >      Anonymity and Privacy.
    > >    o Riccardo Pucella, Vicky Weissman. A Logic for Reasoning
    > >      about Digital Rights.
    > >    o Riccardo Focardi, Sabina Rossi. A Security Property for
    > >      Processes in Dynamic Contexts.
    > >    o Ajay Chander, Drew Dean, John
    > >      C. Mitchell. Deconstructing Trust Management.
    > >
    > > Session II: Cryptographic Primitives and Protocol Analysis
    > >
    > >    o Daniele Micciancio, Bogdan Warinschi. Completeness
    > >      Theorems for the Abadi-Rogaway Language of Encrypted
    > >      Expressions.
    > >    o Cathy Meadows, Paliath Narendran. A Unification
    > >      Algorithm for the Group Diffie-Hellman Protocol.
    > >
    > > Session III: Dolev-Yao-style Protocol Analysis
    > >
    > >    o Gavin Lowe. Analysing protocols subject to guessing
    > >      attacks.
    > >    o Iliano Cervesato. The Wolf Within.
    > >    o P. J. Broadfoot, A. W. Roscoe. Internalising Agents in
    > >      CSP protocol models.
    > >
    > > Panel: Survivability
    > >
    > > Tuesday, 15 January 2002
    > >
    > > Session IV: Non-Interference and Probability
    > >    (Joint session with PEPM,
    > >    Partial Evaluation and Semantics-Directed
    > >    Program Manipulation.)
    > >
    > >    o Geoffrey Smith. Weak Probabilistic Bisimulation for
    > >      Secure Information Flow.
    > >    o Alessandro Aldini. On the Extension of Non-interference
    > >      with Probabilities.
    > >    o Alessandra Di Pierro, Chris Hankin, Herbert
    > >      Wiklicky. On Approximate Non-Interference.
    > >
    > > Session V: Protocol Development
    > >
    > >    o Raphael Yahalom. Delegated Enforcement in Secure
    > >      Protocols.
    > >    o Dominic Duggan. Cryptographic Types.
    > >    o Carla Bodei, Pierpaolo Degano, Riccardo Focardi,
    > >      Corrado Priami. Authentication Primitives for Refining
    > >      Protocol Specifications.
    > >
    > > Session VI: Protocol Verification Methods
    > >
    > >    o Myla Archer. Proving Correctness of the TESLA Multicase
    > >      Stream Authentication Protocol with TAME.
    > >    o Stefania Gnesi, Diego Latella, Gabriele Lenzini. A
    > >      BRUTUS Logic for the Spi-Calculus.
    > >    o Maurizio Panti, Luca Spalazzi, Simone
    > >      Tacconi. Verification of Security Properties in
    > >      Electronic Payment Protocols.
    > >
    > > Location
    > >
    > > The workshop is co-located with the POPL '02 conference,
    > > which will be held at the Portland Marriott Downtown in
    > > Portland Oregon. Registration, room rates, etc. are handled
    > > in conjunction with POPL '02.
    > > <URL:http://www.cse.ogi.edu/PacSoft/conf/popl/index.htm>
    > >  
    > > Overall Topic and Format of Workshop:
    > >
    > > The IFIP WG 1.7 on "Theoretical Foundations of Security
    > > Analysis and Design" was established to investigate the
    > > theoretical foundations of security. It aims to discover and
    > > promote new ways to apply theoretical techniques in computer
    > > security, and to support the systematic use of formal
    > > techniques in the development of security related
    > > applications.
    > >
    > > The workshop of Working Group 1.7 is an open event. All
    > > researchers working on the theory of computer security are
    > > invited. WITS '02 is the second workshop, the first having
    > > been held in Geneva in July 2000 (WITS'00).
    > >
    > > The program will encourage discussions by all attendees,
    > > both during and after scheduled presentations, on
    > > participants' ongoing work. Extended abstracts of work
    > > accepted for presentation at the Workshop will be
    > > distributed at the Workshop the participants. Although -- as
    > > in 2000 -- there will be no formally published proceedings
    > > of this year's workshop, selected papers will be invited for
    > > submission to a special issue of the Journal of Computer
    > > Security based on the Workshop.
    > >  
    > >
    > > CONTACT INFORMATION:
    > >
    > > Web: http://www.dsi.unive.it/IFIPWG1_7/wits2002.html
    > >
    > > Program chair: Joshua Guttman
    > > Postal address:
    > >       The MITRE Corporation, MS S119
    > >       202 Burlington Rd.
    > >       Bedford, MA 01730 USA
    > > E-mail: guttman@private
    > > Telephone: +1 781 271 2654
    > > Fax: +1 781 271 8953
    > >  
    > >
    > > General chair: Paul Syverson
    > > Postal address:
    > >       Code 5543
    > >       Naval Research Laboratory
    > >       Washington DC 20375 USA
    > > E-mail: syverson@private
    > > Telephone: +1 202 404 7931
    > > Fax: +1 202 404 1167
    > > Web: www.syverson.org
    > >  
    > >
    > >
    > >
    > > --
    > > 	Joshua D. Guttman		<guttman@private>
    > > 	MITRE, Mail Stop S119
    > > 	202 Burlington Rd.		Tel:	+1 781 271 2654
    > > 	Bedford, MA 01730-1420 USA	Fax:	+1 781 271 8953
    



    This archive was generated by hypermail 2b30 : Sun May 26 2002 - 11:36:47 PDT