Deprecated: The each() function is deprecated. This message will be suppressed on further calls in /home/zhenxiangba/zhenxiangba.com/public_html/phproxy-improved-master/index.php on line 456
The 4th ACM Workshop on
Formal Methods in Security Engineering
Friday Nov. 3, 2006, Johnson Center,
George Mason University, Fairfax, Virginia, USA
8.50am – 9.00am
Welcome
D. Sands
9.00am – 10.30am
Session 1 Session Chair: A. D. Gordon
Invited TalkSearching for shapes
J. Guttman (Mitre Corporation)
Securing the Drop-Box Architecture for Assisted Living
M. J. May (University of Pennyslvania),
W. Shin, C. A. Gunter (University of Illinois at Urbana-Champaign),
I. Lee (University of Pennyslvania)
10.30am – 11.00am
Break
11.00am – 12.30pm
Session 2 Session Chair: TBA
P-Congruences as Non-Interference for the π-calculus
S. Crafa (Università di Padova), S. Rossi (Università Ca'Foscari di Venezia)
An Intruder Model for Verifying Liveness in Security Protocols
J. Cederquist (University of Twente),
M. T. Dashti (Centrum voor Wiskunde en Informatica)
Secure Information Flow with Random Assignment and Encryption
G. Smith, R. Alpízar (Florida International University)
12.30 – 2.00pm
Lunch
2.00pm – 3.30pm
Session 3 Session Chair: D. Sands
Invited TalkEncoding Information Flow in Haskell
S. Zdancevic (University of Pennsylvania)
Defeasible Security Policy Composition for Web Services
A. J. Lee, J. P. Boyer, L. E. Olson, C. A. Gunter (University of Illinois at Urbana-Champaign)
3.30pm – 4.00pm
Break
4.00pm – 5.00pm
Session 4 Session Chair: TBA
NETRA: Seeing Through Access Control
P. Naldurg (Microsoft Research India), S. Schwoon (Universität Stuttgart),
S. Rajamani (Microsoft Research India), J. Lambert (Microsoft Corporation)
Bridging the Gap Between Web Application Firewalls and Web Applications
L. Desmet, F. Piessens, W. Joosen, P. Verbaeten (Katholieke Universiteit Leuven)