9:00 - 9:50 | A general overview of cryptographic protocol analysis
[pdf]
Cathy Meadows (NRL) |
10:00 - 10:15 | Welcome remarks
|
10:15 - 11:15 | Probablistic Polynomial-Time Process Calculus for Security Protocol
Analysis
[ppt]
Andre Scedrov (UPenn) |
11:15 - 12:15 | Multiset Rewriting
[ppt]
John Mitchell (Stanford) |
12:15 - 1:30 | Lunch
|
1:30 - 2:30 | Protocol Analysis Tool Development Using Java
[ppt]
Stephen Mancini (Air Force Institute of Technology) |
2:30 - 3:30 | Approximations to Diffie-Hellman using rewrite rules
[ppt]
Chris Lynch (Clarkson) |
3:30 - 4:00 | Break
|
4:00 - 5:00 | Fine-Grained MSR Specificaitons for Quantitative Security Analysis
[ppt]
Iliano Cervesato (ITT) |
5:30 - ... | Social dinner
[photos]
|
9:00 - 9:50 | Authentication Tests using Strand Spaces
[pdf]
Al Maneki (NSA) |
10:00 - 11:00 | The Trust Supports and the Shapes of Bundles
[advi,
ps,
pdf]
Joshua Guttman (MITRE) |
11:00 - 12:00 | Cash Transfer Primitives, Trust Management and Money
[ps]
Javier Thayer (MITRE) |
12:00 - 1:00 | Lunch
|
1:00 - 2:00 | Security Policies embodied in Security Protocols
George Dinolt (NPS), Sylvan Pinsky (NSA) |
2:00 - 3:00 | Protocol Analysis Using SAL
[pdf]
John Rushby (SRI) |
3:00 - 3:00 | Break
|
3:30 - 5:00 | Research Overview
[ppt]
Open APIs for Embedded Security [ppt] Carl Gunter (UPenn) |
9:00 - 9:50 | Understanding Strand Space Concepts and their application to protocol
analysis
[advi,
ps,
pdf]
Joshua Guttman (MITRE) |
10:00 - 11:00 | Security Issues in Wireless Comunication
Ed Zieglar (NSA) |
11:00 - 12:00 | Concurrent Broadcasting Schemes for Wireless Networks
[html]
Mark-Oliver Stehr (UIUC) |
12:00 - 1:00 | Lunch
|
1:00 - 2:00 | The Maude Execution Environment
[ppt,
pdf]
Carolyn Talcott (SRI) |
2:00 - 3:00 | Applying a Compositional Authenticatino Logic to a Protocol Standard
[pdf]
Cathy Meadows (NRL) |
3:00 - 3:00 | Break
|
3:30 - 4:30 | Trusting the Network
[ppt?]
Dominic Duggan (Stevens) |