|
ZISC Colloquium
Speaker:
Knut Eckstein, European Space Agency/ESTEC
Title:
An introduction to Computer Forensics R&D
Place: HG F5
Time: 17:15
Speaker: Samuel Müller
Title: Runtime Monitoring of Metric First-order Temporal Properties
Place: IFW C 44
Time: 14:00
Speaker: Johannes Kern
Title: On the Galois groups of the exponential Taylor polynomials Abstract
Place: IFW D 42
Time: 14:00
Speaker: Adrian Kyburz
Title: Operational Semantics of Security Protocols
Place: IFW C 44
Time: 14:00
ZISC Colloquium
Speaker:
Christian Wolter and Andreas Schaad, SAP AG
Title: TBA
Place: HG F5
Time: 17:15
Speaker: Prof. Dr. Stefan Leue
Title: On Automated Analysis of Concurrent Reactive Systems
Place: IFW C 44
Time: 14:00
ZISC Colloquium
Speaker: Christian Damgaard Jensen, Technical University of Denmark
Title: TBA
Place: HG F5
Time: 17:15
Speaker: Mario Frank
Title: A Class of Probabilistic Models for Role Engineering
Place: IFW C 44
Time: 14:10
ZISC Colloquium
Speaker: Adi Shamir, Weizmann Institute of Science, Israel
Title:
How Cryptosystems Get Broken
Place: IFW A36
Time: 16:15
Speaker: Hugo Jonker
Title: Quantifying voter-controlled privacy
Place: IFW C44
Time: 14:00
ZISC Colloquium
Speaker: Victor Shoup, New York University
Title:
The Twin Diffie-Hellman Problem and Applications
Place: HG F5
Time: 17:15
ZISC Colloquium
Speaker: Ran Canetti, Tel Aviv University
Title: How to Assert and Use Composable Security
Place: HG F5
Time: 17:15
Speaker: Sybille Fröschle, University Oldenburg
Title: Adding branching to the
strand space model
Place: IFW C44
Time: 14:00
ZISC Colloquium
Speaker: Nur Zincir-Heywood, and Malcolm Heywood,
Dalhousie University
Halifax, Canada
Title:
Classifying Encrypted Traffic without the Payload: A Case Study of SSH
Place: HG F5
Time: 17:15
ZISC Workshop on Advanced Concepts of Access and Usage Control
Information is available at zisc.ethz.ch/events/workshop2008
Speaker: Matus Harvan
Title: Usage control with system call interposition
Place: IFW C44
Time: 14:00
Student end presentations
Speaker: Matthias Büchler
Title: Implementing Usage Control for Managed Information
Speaker: Michael Hänni
Title: Configuration of Services for Usage Control
Place: IFW C44
Time: 14:00
Speaker: Knut Eckstein, European Space Agency/ESTEC
Title: My God, Space is Radioactive!
Place: IFW C44
Time: 14:00
Speaker: Christian Dax
Title: Alternation Elimination by Complementation
Place: IFW C44
Time: 11:30
Speaker: Peter Ryan, School of Computing Science, Newcastle University
Title: Prêt à Voter with
Paillier Encryption
Place: IFW C44
Time: 14:00
Speaker: Van-Chan NGO
Title: Automated Verification of Asymmetric Encryption
Place: IFW C44
Time: 11:00
Speaker: Rafael Accorsi, Dept. of Telematics, University of Freiburg, Germany
Title: Automated Audits Based on Falsification
Place: IFW C44
Time: 14:00
Speaker: Bruno Montalto
Title: Modelling an Adversary with Cryptanalytic Capabilities
Place: IFW C44
Time: 14:00
Speaker: Simone Frau
Title: Petri Net Security Checker: Structural Non-interference at Work
Place: IFW D42
Time: 10:00
Speaker: Andreas Leitner
Title: Contract-based tests in the software process and environment
Place: IFW C44
Time: 14:00
Speaker: Domenico Salvati
Title: Talk on Ph.D. thesis with title "Management of Information System Risk"
Place: IFW C44
Time: 14:00
Speaker: Manuel Krucker
Title: A package for well-formedness checking and proof obligation generation for UML/OCL specifications
Place: IFW C44
Time: 15:15
ZISC Colloquium
Speaker: Urs P. Kuederli, Microsoft Switzerland
Title: Software Security Engineering and Development Today Security Development Lifecycle (SDL) - A Process to Develop More Secure Software
Place: HG F 5
Time: 17:15
ZISC Colloquium
Speaker: Prof. Guevara Noubir, College of Computer and Information Science Northeastern University Boston
Title: Heterogeneous Wireless Networks in Cooperative and Adversarial Settings
Place: HG F 5
Time: 17:15
ZISC Colloquium
Speaker: Jürg Eiholzer, Crypto AG
Title: Evaluation Standards for Information Security Systems
Place: HG F 5
Time: 17:15
ZISC Colloquium
Speaker: Volkmar Lotz, SAP Germany
Title: Towards Systematic Achievement of Compliance in Service-oriented Architectures: The MASTER Approach
Place: HG F 5
Time: 17:15
ZISC Colloquium
Speaker: Stefan Frei, ETH Zurich
Title: 0-Day Patch - A New security ecosystem metric
Place: HG F 5
Time: 17:15
ZISC Colloquium
Speaker: Prof. Michael Backes, Saarland University
Title: On Machine-assisted Verification of Cryptography, and on Novel Eavesdropping Techniques
Place: HG F 5
Time: 17:15
Speaker: Carsten Schuermann
Title: Trustworthy electronic elections
Place: IFW C 44
Time: 14:00
ZISC Colloquium
Speaker: Christoph Brandt
Title: How should security issues of worldwide distributed coarse-grain IT components in decentralized banking environments be handled?
Place: HG F 5
Time: 17:15
Speaker: Samuel Burri
Title: Dynamic Separation of Duty Enforcement with Automata
Place: IFW C 44
Time: 14:00
Speaker: Moritz Kuhn
Title: Testing Rich Web Applications for XSS Vulnerabilities
Place: IFW C 44
Time: 14:30
Speaker: Felix Klaedtke
Title: Ehrenfeucht-Fraisse Goes Automatic for Real Addition
Place: IFW C 44
Time: 14:00
Student end presentations
Speaker: Andreas Schmidt
Title: Transformation of UML Use-case Diagrams to Access-control Policy Templates
Speaker: Martin Bill
Title: Association-related Model Transformations
Place: IFW C 44
Time: 10:00
Student end presentations
Speaker: Florian Schuetz
Title: Delegation in Usage Control
Speaker: Judith Rüesch
Title: Model Checking Usage Control Policies
Place: IFW D 42
Time: 14:00
Wichtiger Hinweis:
Diese Website wird in älteren Versionen von Netscape ohne
graphische Elemente dargestellt. Die Funktionalität der
Website ist aber trotzdem gewährleistet. Wenn Sie diese
Website regelmässig benutzen, empfehlen wir Ihnen, auf
Ihrem Computer einen aktuellen Browser zu installieren. Weitere
Informationen finden Sie auf
folgender
Seite.
Important Note:
The content in this site is accessible to any browser or
Internet device, however, some graphics will display correctly
only in the newer versions of Netscape. To get the most out of
our site we suggest you upgrade to a newer browser.
More
information