Lorentz Center - Logic and information security from 22 Sep 2008 through 26 Sep 2008
  Current Workshop  |   Overview   Back  |   Home   |   Search   |     

    Logic and information security
    from 22 Sep 2008 through 26 Sep 2008

 
Preliminary Program

 

Program “Logic and Information Security”

 
 

----------------------------------------------------------------------------------------------------------------------------------------------------------

Monday September 22th 2008

----------------------------------------------------------------------------------------------------------------------------------------------------------

 
Logic and protocols 1
 
               09.20 – 09.30      Introduction of the Lorentz Center and a few words by the organizers
               
               09.30 – 10.30      Johan van Benthem, Information flow and procedural information
 
               10.30 – 11.00      Coffee break
 
               11.00 – 12.00      Aaron Hunter, Message Passing, Belief Change and Information Security
 
               12.00 – 14.00      Lunch
 
Logic and protocols 2
 
               14.00 – 14.45      Discussion session
               
               15.00 – 16.00      Jan van Eijck & Yanjing Wang, Dynamic Epistemic Modelling and Abstraction
 
               16.00 – 16.30      Coffee break 
 
               16.30 – 17.30      Francien Dechesne, Operational and Epistemic Approaches to Protocol Analysis: 
                                              bridging the Gap
 
 
 

----------------------------------------------------------------------------------------------------------------------------------------------------------

Tuesday September 23rd 2008

----------------------------------------------------------------------------------------------------------------------------------------------------------

 
Model checking temporal and dynamic epistemic logic 1
 
               09.30 – 10.30      Alessio Lomuscio, Symbolic model checking temporal epistemic logic and      
                                              (possible!) applications to the automatic verification of security protocols
               
               10.30 – 11.00      Coffee break
 
               11.00 – 12.00      Ron van der Meyden, Distributed Knowledge and Information Flow Security
 
               12.00 – 13.30      Lunch
 
               13.30 – 15.00      Demonstrations of the model checkers MCMAS (Lomuscio), MCK (van der         
                                              Meyden), and DEMO (van Eijck)
                                              
                                              Arrival and welcome in Lorentz Center of NIAS fellows (14.30)
 
               15.00 – 15.30      Coffee break 
 
Public Lecture 
 
               15.30 – 17.00      Public Lecture: Bart Jacobs, Smart cards in public transport: the Mifare Classic                  
                                              Case. 
 
               17.00                     Wine and Cheese Party
 

 

----------------------------------------------------------------------------------------------------------------------------------------------------------

Wednesday September 24th 2008

----------------------------------------------------------------------------------------------------------------------------------------------------------

 
Zero-knowledge, provability
 
               09.30 – 10.30      Catuscia Palamidessi, Formal approaches to Information-Hiding
 
               10.30 – 11.00      Coffee break
 
               11.00 – 12.00      Simon Kramer, Reducing Provability to Knowledge in Multi-Agent Systems
 
               12.00 – 14.00      Lunch
 
Model checking temporal and dynamic epistemic logic II
 
               14.00 – 14.45      Discussion session
               
               15.00 – 16.00      Alessandro Armando, LTL Model Checking for Security Protocol Analysis
 
               16.00 – 16.30      Coffee break 
 
               16.30 – 17.30      Mark Ryan, Verifying privacy-type properties of electronic voting protocols
 

 

----------------------------------------------------------------------------------------------------------------------------------------------------------

Thursday September 25th 2008

----------------------------------------------------------------------------------------------------------------------------------------------------------

 
Cards and cryptography
 
          09.30 – 10.30      Michael Albert, Design theory and cards cryptography
               
               10.30 – 11.00      Coffee break
 
               11.00 – 12.00      Hans van Ditmarsch, Unconditionally secure protocols employing card deals
               
               12.00 – 14.00      Lunch
 
Protocol verification and complexity
 
          14.00 – 14.45      Discussion session
               
               15.00 – 16.00      Michael Rusinowitch, Towards extending constrained-based analysis of              
                                              security protocols to web-services
 
               16.00 – 16.30      Coffee break 
 
               16.30 – 17.30      Cas Cremers, Moving from unbounded verification towards formal protocol        
 
                                              Proofs. 
 
               18.00 – 21.00      Workshop dinner 
 

 

----------------------------------------------------------------------------------------------------------------------------------------------------------

Friday September 26th 2008

----------------------------------------------------------------------------------------------------------------------------------------------------------

 
Modelling permission and multi-agent protocol
 
          09.30 – 10.30      Philippe Balbiani, Having the permission to know
 
               10.30 – 11.00      Coffee break
 
               11.00 – 12.00      Rineke Verbrugge, Knowledge-based algorithm for multi-agent communication
 
               12.00 – 14.00      Lunch
 
Temporal and dynamic epistemic logic
 
               14.00 – 14.45      Discussion session
 
               15.00 – 16.00      Thomas Wilke, Modal and Temporal Logics for Cryptographic Protocols
 
               16.00 – 16.30      Coffee break 
 
               16.30 – 17.30      Ramanujam & Suresh, Decidability issues in epistemic logics for security                                           
                                              protocols
 
 

----------------------------------------------------------------------------------------------------------------------------------------------------------

End of Workshop

----------------------------------------------------------------------------------------------------------------------------------------------------------

 



   [Back]