Protocol eXchange Meeting - January 2011
Protocol eXchange Meeting
National Cryptologic Museum
Magic Room
January 4, 2011
08:30 - 08:45 | Arrival and Welcome |
08:45 - 09:35 | Annotated Sequence Diagrams Jon Millen (MITRE) |
09:35 - 10:25 | A Completeness Proof for the CPSA Moses Liskov (MITRE) |
10:25 - 10:35 | Break |
10:35 - 11:25 | Bounded Memory Dolev-Yao Adversaries in Collaborative Systems Andre Scedrov (University of Pennsylvania) |
11:25 - 12:15 | Security Goals and Protocol Transformations Joshua D. Guttman (Worcester Polytechnic Institute) |
12:15 - 13:40 | Lunch |
13:40 - 14:30 | Secure Nested Transactions Dominic Duggan (Stevens Institute of Technology) |
14:30 - 15:20 | Implementing Nondeterministic and Deterministic Choice in Maude-NPA Cathy Meadows (NRL) |
15:20 - 15:25 | Break |
15:25 - 15:55 | Characterizing the Search Space of Cryptographic Protocol Analysis Tools Carolyn Talcott (SRI) |
15:55 - 16:00 | Wrap-up |