[TYPES/announce] Call for participation: FCS'13 Workshop on Foundations of Computer Security

Bruno Blanchet bruno.blanchet at inria.fr
Wed May 15 11:28:10 EDT 2013


+-------------------------------------------------------------------------+
!                                                                         !
!                         Call for participation                          !
!			         FCS 2013                                 !
!                Workshop on Foundations of Computer Security             !
!               Tulane University, New Orleans, Louisiana, USA            !
!                              June 29, 2013                              !
!              http://prosecco.inria.fr/personal/bblanche/fcs13/          !
!                                                                         !
!                   Affiliated with LICS 2013 and CSF 2013                !
!                                                                         !
+-------------------------------------------------------------------------+

Registration is via the CSF/LICS/MFPS registration web site:
        http://csf2013.seas.harvard.edu/registration.html
Early registration deadline: May 22.

Programme
---------

9:00-10:00 Invited talk

Static Analysis of Cache Side Channels
Boris Koepf

10:00-10:30 Coffee break

10:30-12:30 Information flow

When not all bits are equal: Incorporating "worth" into information-flow measures
Mario S. Alvim, Andre Scedrov, and Fred B. Schneider.

Abstract channels, gain functions and the information order
Annabelle McIver, Carroll Morgan, Larissa Meinicke, Geoffrey Smith, and Barbara Espinoza.

MAP-REDUCE Runtime Enforcement of Information Flow Policies
Minh Ngo, Fabio Massacci, and Olga Gadyatskaya.

A Framework for Composing Noninterferent Languages
Andreas Gampe and Jeffery Von Ronne.

12:30-14:00 Lunch

14:00-15:30 Security protocols (1)

A Formal Framework for Secure Routing Protocols
Chen Chen, Limin Jia, Hao Xu, Cheng Luo, Wenchao Zhou, and Boon Loo.

Translating between equational theories for automated reasoning
Ben Smyth, Myrto Arapinis, and Mark Ryan

Using Interpolation for the Verification of Security Protocols (Extended Abstract)
Giacomo Dalle Vedove, Marco Rocchetto, Luca Viganò, and Marco Volpe.

15:30-16:00 Coffee break

16:00-17:00 Security protocols (2)

Bounded Memory Protocols and Progressing Collaborative Systems
Max Kanovich, Tajana Ban Kirigin, Vivek Nigam, and Andre Scedrov.

A Multi-Role Translation of Protocol Narration into the Spi-Calculus with Correspondence Assertions
Eijiro Sumii and Yuji Sato.


More information about the Types-announce mailing list