Tuesday, 10th of February
Coffee & Registration (09:00 - 10:00) | |
Session 1 (10:00 - 12:30) | |
10:00 - 10:30 | Charu Arora and Mathieu Turuani Validating Integrity for the Ephemerizer's Protocol with CL-Atse |
10:30 - 11:00 | Ton van Deursen and Saša Radomirović On a New Formal Proof Model for RFID Location Privacy |
11:00 - 11:30 | Nuno Amalio From Monitoring Templates to Security Monitoring and Threat Detection |
11:40 - 12:30 | Michael Backes (Invited Speaker) On Machine-assisted Verification of Cryptography, and on Novel Eavesdropping Techniques |
Lunch and Poster Presentations (12:30 - 14:00) | |
Poster 1 | Eugen Staab and Thomas Engel Collusion Detection for Distributed Computing |
Poster 2 | Jacques Klein, Nicolas Guelfi and Yves Le Traon SETER: Security Testing of Resilient System |
Poster 3 | Barbara Gallina and Nicolas Guelfi SPLACID: an SPL-oriented, ACTA-based, Language for Reusing (Varying) ACID Properties in Engineering Dependable Distributed Systems |
Poster 4 | Patrizio Barbini, Guido Boella and Piercarlo Rossi E-business Outsourcing: a New Approach combining Information Rights Technologies and Agent-Based Theory on Norms |
Poster 5 | Hugo Jonker, Sjouke Mauw and Jun Pang EPRIV: A Formal Approach to Enforced Privacy in e-Services |
Session 2 (14:00 - 15:30) | |
14:00 - 14:30 | Valerio Genovese, Guido Boella and Dov Gabbay FSL - Fibred Security Language |
14:30 - 15:00 | Horatiu Cirstea and Tony Bourdier Analysis of Lattice-Based Access Control Policies using Rewiting Systems and Tom |
15:00 - 15:30 | David Déharbe, Loïc Fejoz, Pascal Fontaine and Stephan Merz Verified Incremental Development of Lock-Free Algorithms |
Coffee (15:30 - 16:00) | |
Session 3 (16:00 - 17:30) | |
16:00 - 16:30 | Philippe Beaucamps, Daniel Reynaud, Jean-Yves Marion and Eric Filiol On the Impact of Malware on Internet Voting |
16:30 - 17:00 | Marek Ostaszewski, Pascal Bouvry and Franciszek Seredynski Approach to Intrusion Detection by Means of Idiotypic Networks Paradigm |
17:00 - 17:30 | David Galindo Breaking and repairing Damgard et al. Public Key Encryption Scheme with Non-interactive Opening |
Drinks (17:30 - ) |