Table of Contents:
  • Invited Lecture
  • Semantics and Enforcement of Expressive Information Flow Policies
  • Session 1. Trust
  • An Algebra for Trust Dilution and Trust Fusion
  • HMM-Based Trust Model
  • Deriving Trust from Experience
  • Reflections on Trust: Trust Assurance by Dynamic Discovery of Static Properties
  • Session 2. Workflow and Orchestration
  • Model Checking of Security-Sensitive Business Processes
  • Session 3. Secure Flow
  • Analysing the Information Flow Properties of Object-Capability Patterns
  • Applied Quantitative Information Flow and Statistical Databases
  • Specification and Verification of Side Channel Declassification
  • Secure Information Flow for Distributed Systems
  • Session 4. Mobility and Deniability
  • Probable Innocence in the Presence of Independent Knowledge
  • A Calculus of Trustworthy Ad Hoc Networks
  • Session 5. Protocols 1
  • Comparison of Cryptographic Verification Tools Dealing with Algebraic Properties
  • Game-Based Verification of Multi-Party Contract Signing Protocols
  • Attack, Solution and Verification for Shared Authorisation Data in TCG TPM
  • Session 6. Protocols 2
  • Trusted Multiplexing of Cryptographic Protocols
  • Specifying and Modelling Secure Channels in Strand Spaces
  • Session 7. Protocols 3
  • Integrating Automated and Interactive Protocol Verification
  • A User Interface for a Game-Based Protocol Verification Tool.