1st Luxembourg Day on
Security and Reliability

February 10, 2009, University Campus Kirchberg, Luxembourg city, Luxembourg

Université du Luxembourg

Tuesday, 10th of February

Coffee & Registration (09:00 - 10:00)
Session 1 (10:00 - 12:30)
10:00 - 10:30 Charu Arora and Mathieu Turuani
Validating Integrity for the Ephemerizer's Protocol with CL-Atse
10:30 - 11:00 Ton van Deursen and Saša Radomirović
On a New Formal Proof Model for RFID Location Privacy
11:00 - 11:30 Nuno Amalio
From Monitoring Templates to Security Monitoring and Threat Detection
11:40 - 12:30 Michael Backes (Invited Speaker)
On Machine-assisted Verification of Cryptography, and on Novel Eavesdropping Techniques
Lunch and Poster Presentations (12:30 - 14:00)
Poster 1 Eugen Staab and Thomas Engel
Collusion Detection for Distributed Computing
Poster 2 Jacques Klein, Nicolas Guelfi and Yves Le Traon
SETER: Security Testing of Resilient System
Poster 3 Barbara Gallina and Nicolas Guelfi
SPLACID: an SPL-oriented, ACTA-based, Language for Reusing (Varying) ACID Properties in Engineering Dependable Distributed Systems
Poster 4 Patrizio Barbini, Guido Boella and Piercarlo Rossi
E-business Outsourcing: a New Approach combining Information Rights Technologies and Agent-Based Theory on Norms
Poster 5 Hugo Jonker, Sjouke Mauw and Jun Pang
EPRIV: A Formal Approach to Enforced Privacy in e-Services
Session 2 (14:00 - 15:30)
14:00 - 14:30 Valerio Genovese, Guido Boella and Dov Gabbay
FSL - Fibred Security Language
14:30 - 15:00 Horatiu Cirstea and Tony Bourdier
Analysis of Lattice-Based Access Control Policies using Rewiting Systems and Tom
15:00 - 15:30 David Déharbe, Loïc Fejoz, Pascal Fontaine and Stephan Merz
Verified Incremental Development of Lock-Free Algorithms
Coffee (15:30 - 16:00)
Session 3 (16:00 - 17:30)
16:00 - 16:30 Philippe Beaucamps, Daniel Reynaud, Jean-Yves Marion and Eric Filiol
On the Impact of Malware on Internet Voting
16:30 - 17:00 Marek Ostaszewski, Pascal Bouvry and Franciszek Seredynski
Approach to Intrusion Detection by Means of Idiotypic Networks Paradigm
17:00 - 17:30 David Galindo
Breaking and repairing Damgard et al. Public Key Encryption Scheme with Non-interactive Opening
Drinks (17:30 - )

Supported by:

University of Luxembourg
Computer Science and Communications Research Unit
Laboratory of Algorithmics, Cryptology and Security
Interdisciplinary Lab for Intelligent and Adaptive Systems