On Wednesday 05 December 2001 12:12, Sarah Mocas wrote: > For all interested, there will be an international workshop > on issues in the theory of computer security held in Portland > this January. The registration info on the site listed below > has registration at $140 to $170 depending on affiliations and > deadlines. This type of conference is heavy on formal logics > and mathematical models but will still present good insight into > protocol analysis in general. Some of the papers should be > available at author's web sites if you are interested. Yeah, but what if you can't afford the $140-170? I have no corporate interest paying my way. (The economy makes paupers of us all.) Is there a "poverty stricken Portlander" rate? > > Sarah > > > ------------------------------------------------------------ > > > > Call for Participation > > > > Workshop > > on Issues in the > > Theory of Security > > (WITS '02) > > <URL:http://www.dsi.unive.it/IFIPWG1_7/wits2002.html> > > > > Portland Oregon, USA > > January 14-15 2002 > > > > Co-located with POPL '02, > > the 29th Annual ACM Symposium > > on Principles of Programming Languages > > (January 16-18 2002) > > Register through POPL at > > <URL:http://www.cse.ogi.edu/PacSoft/conf/popl/index.htm> > > ------------------------------------------------------------ > > > > Preliminary Program > > > > Monday, 14 January 2002 > > > > Session I: Security Properties > > > > o Vitaly Shmatikov, Dominic J.D. Hughes. Defining > > Anonymity and Privacy. > > o Riccardo Pucella, Vicky Weissman. A Logic for Reasoning > > about Digital Rights. > > o Riccardo Focardi, Sabina Rossi. A Security Property for > > Processes in Dynamic Contexts. > > o Ajay Chander, Drew Dean, John > > C. Mitchell. Deconstructing Trust Management. > > > > Session II: Cryptographic Primitives and Protocol Analysis > > > > o Daniele Micciancio, Bogdan Warinschi. Completeness > > Theorems for the Abadi-Rogaway Language of Encrypted > > Expressions. > > o Cathy Meadows, Paliath Narendran. A Unification > > Algorithm for the Group Diffie-Hellman Protocol. > > > > Session III: Dolev-Yao-style Protocol Analysis > > > > o Gavin Lowe. Analysing protocols subject to guessing > > attacks. > > o Iliano Cervesato. The Wolf Within. > > o P. J. Broadfoot, A. W. Roscoe. Internalising Agents in > > CSP protocol models. > > > > Panel: Survivability > > > > Tuesday, 15 January 2002 > > > > Session IV: Non-Interference and Probability > > (Joint session with PEPM, > > Partial Evaluation and Semantics-Directed > > Program Manipulation.) > > > > o Geoffrey Smith. Weak Probabilistic Bisimulation for > > Secure Information Flow. > > o Alessandro Aldini. On the Extension of Non-interference > > with Probabilities. > > o Alessandra Di Pierro, Chris Hankin, Herbert > > Wiklicky. On Approximate Non-Interference. > > > > Session V: Protocol Development > > > > o Raphael Yahalom. Delegated Enforcement in Secure > > Protocols. > > o Dominic Duggan. Cryptographic Types. > > o Carla Bodei, Pierpaolo Degano, Riccardo Focardi, > > Corrado Priami. Authentication Primitives for Refining > > Protocol Specifications. > > > > Session VI: Protocol Verification Methods > > > > o Myla Archer. Proving Correctness of the TESLA Multicase > > Stream Authentication Protocol with TAME. > > o Stefania Gnesi, Diego Latella, Gabriele Lenzini. A > > BRUTUS Logic for the Spi-Calculus. > > o Maurizio Panti, Luca Spalazzi, Simone > > Tacconi. Verification of Security Properties in > > Electronic Payment Protocols. > > > > Location > > > > The workshop is co-located with the POPL '02 conference, > > which will be held at the Portland Marriott Downtown in > > Portland Oregon. Registration, room rates, etc. are handled > > in conjunction with POPL '02. > > <URL:http://www.cse.ogi.edu/PacSoft/conf/popl/index.htm> > > > > Overall Topic and Format of Workshop: > > > > The IFIP WG 1.7 on "Theoretical Foundations of Security > > Analysis and Design" was established to investigate the > > theoretical foundations of security. It aims to discover and > > promote new ways to apply theoretical techniques in computer > > security, and to support the systematic use of formal > > techniques in the development of security related > > applications. > > > > The workshop of Working Group 1.7 is an open event. All > > researchers working on the theory of computer security are > > invited. WITS '02 is the second workshop, the first having > > been held in Geneva in July 2000 (WITS'00). > > > > The program will encourage discussions by all attendees, > > both during and after scheduled presentations, on > > participants' ongoing work. Extended abstracts of work > > accepted for presentation at the Workshop will be > > distributed at the Workshop the participants. Although -- as > > in 2000 -- there will be no formally published proceedings > > of this year's workshop, selected papers will be invited for > > submission to a special issue of the Journal of Computer > > Security based on the Workshop. > > > > > > CONTACT INFORMATION: > > > > Web: http://www.dsi.unive.it/IFIPWG1_7/wits2002.html > > > > Program chair: Joshua Guttman > > Postal address: > > The MITRE Corporation, MS S119 > > 202 Burlington Rd. > > Bedford, MA 01730 USA > > E-mail: guttman@private > > Telephone: +1 781 271 2654 > > Fax: +1 781 271 8953 > > > > > > General chair: Paul Syverson > > Postal address: > > Code 5543 > > Naval Research Laboratory > > Washington DC 20375 USA > > E-mail: syverson@private > > Telephone: +1 202 404 7931 > > Fax: +1 202 404 1167 > > Web: www.syverson.org > > > > > > > > > > -- > > Joshua D. Guttman <guttman@private> > > MITRE, Mail Stop S119 > > 202 Burlington Rd. Tel: +1 781 271 2654 > > Bedford, MA 01730-1420 USA Fax: +1 781 271 8953
This archive was generated by hypermail 2b30 : Sun May 26 2002 - 11:36:47 PDT