![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
Monday, September 13th |
09:15 - 09:30 | Opening remarks |
09:30 - 10:30 | Invited talk: Cryptographic Security of Reactive Systems - Linking Cryptography and Formal Methods |
Michael Waidner
IBM Zurich Research Laboratory, Switzerland | |
10:30 - 11:00 | coffee break |
11:00 - 12:30 | Access control |
Incorporating Dynamic Constraints in the Flexible Authorization Framework
Shiping Chen, Duminda Wijesekera, Sushil Jajodia | |
Access-Condition-Table-driven Access Control for XML Database
Naizhen Qi, Michiharu Kudo | |
An Algebra for Composing Enterprise Privacy Policies
Michael Backes, Markus Duermuth, Rainer Steinwandt | |
12:30 - 14:00 | lunch |
14:00 - 15:30 | Cryptographic protocols |
Deriving, attacking and defending the GDOI protocol
Catherine Meadows, Dusko Pavlovic | |
Better Privacy for Trusted Computing Platforms
Jan Camenisch | |
A Cryptographically Sound Dolev-Yao Style Security Proof of the Otway-Rees Protocol
Michael Backes | |
15:30 - 16:00 | coffee break |
16:00 - 17:30 | Anonymity and information hiding |
A Formalization of Anonymity and Onion Routing
Sjouke Mauw, Jan Verschuren, Erik de Vink | |
Breaking Cauchy Model-based JPEG Steganography with First Order Statistics
Rainer Böhme, Andreas Westfeld | |
Comparison between two practical mix designs
Claudia Diaz, Len Sassaman, Evelyne Dewitte | |
18:30 - | Reception - Mediathel |
Tuesday, September 14th |
09:00 - 10:30 | Distributed data protection |
Signature Bouquets: Immutability for Aggregated/Condensed Signatures
Einar Mykletun, Maithili Narasimha, Gene Tsudik | |
Towards a theory of data entanglement
James Aspnes, Joan Feigenbaum, Aleksandr Yampolskiy, Sheng Zhong | |
Portable and Flexible Document Access Control Mechanisms
Mikhail Atallah, Marina Bykova | |
10:30 - 11:00 | coffee break |
11:00 - 12:30 | Information flow and security properties |
Possibilistic Information Flow Control in the Presence of Encrypted Communication
Dieter Hutter, Axel Schairer | |
Information flow control revisited: Noninfluence = Noninterference + Nonleakage
David von Oheimb | |
Security Property Based Administrative Controls
Jon A. Solworth, Robert H. Sloan | |
12:30 - 14:00 | lunch |
14:00 - 15:30 | Authentication and trust management |
A Vector Model of Trust for Developing Trustworthy Systems
Indrajit Ray, Sudip Chakraborty | |
Parameterized Authentication
Michael J. Covington, Mustaque Ahamad, Irfan Essa, H. Venkateswaran | |
Combinatorial Design of Key Distribution Mechanisms for Wireless Sensor Networks
Bulent Yener, Seyit A. Camtepe | |
15:30 - 16:00 | coffee break |
16:00 - 17:30 | Cryptography |
IPv6 Opportunistic Encryption
Claude Castelluccia, Gabriel Montenegro, Julien Laganier, Christoph Neumann | |
On the role of key schedules in attacks on iterated ciphers
Lars R. Knudsen, John E. Mathiassen | |
A Public-Key Encryption Scheme with Pseudo-Random Ciphertexts
Bodo Möller | |
20:00 - | Banquet - Restaurant Plage Keller - Antibes |
Wednesday, September 15th |
09:00 - 10:30 | Operating systems and architecture |
A Host Intrusion Prevention System for Windows Operating Systems
Roberto Battistoni, Emanuele Gabrielli, Luigi Vincenzo Mancini | |
Re-establishing Trust in Compromised Systems: Recovering from Rootkits that Trojan the System Call Table
Julian Grizzard, John Levine, Henry Owen | |
ARCHERR: Runtime Environment Driven Program Safety
Ramkumar Chinchani, Anusha Iyer, Bharat Jayaraman, Shambhu Upadhyaya | |
10:30 - 11:00 | coffee break |
11:00 - 12:30 | Intrusion detection |
Sets, Bags, and Rock and Roll Analyzing Large Data Sets of Network Data
John McHugh | |
Redundancy and diversity in security
Bev Littlewood, Lorenzo Strigini | |
Discovering Novel Attack Strategies from INFOSEC Alerts
Xinzhou Qin, Wenke Lee | |