printlogo
ETH Zuerich - Homepage
Information Security
 
print
  

Talks in 2008

Tuesday, December 16, 2008

ZISC Colloquium
Speaker: Knut Eckstein, European Space Agency/ESTEC
Title: An introduction to Computer Forensics R&D
Place: HG F5
Time: 17:15

Tuesday, December 2, 2008

Speaker: Samuel Müller
Title: Runtime Monitoring of Metric First-order Temporal Properties
Place: IFW C 44
Time: 14:00

Tuesday, November 27, 2008

Speaker: Johannes Kern
Title: On the Galois groups of the exponential Taylor polynomials Abstract
Place: IFW D 42
Time: 14:00

Tuesday, November 25, 2008

Speaker: Adrian Kyburz
Title: Operational Semantics of Security Protocols
Place: IFW C 44
Time: 14:00

ZISC Colloquium
Speaker: Christian Wolter and Andreas Schaad, SAP AG
Title: TBA
Place: HG F5
Time: 17:15

Tuesday, November 4, 2008

Speaker: Prof. Dr. Stefan Leue
Title: On Automated Analysis of Concurrent Reactive Systems
Place: IFW C 44
Time: 14:00

Tuesday, October 21, 2008

ZISC Colloquium
Speaker: Christian Damgaard Jensen, Technical University of Denmark
Title: TBA
Place: HG F5
Time: 17:15

Tuesday, October 14, 2008

Speaker: Mario Frank
Title: A Class of Probabilistic Models for Role Engineering
Place: IFW C 44
Time: 14:10

Monday, October 13, 2008

ZISC Colloquium
Speaker: Adi Shamir, Weizmann Institute of Science, Israel
Title: How Cryptosystems Get Broken
Place: IFW A36
Time: 16:15

Tuesday, September 30, 2008

Speaker: Hugo Jonker
Title: Quantifying voter-controlled privacy
Place: IFW C44
Time: 14:00

Tuesday, September 23, 2008

ZISC Colloquium
Speaker: Victor Shoup, New York University
Title: The Twin Diffie-Hellman Problem and Applications
Place: HG F5
Time: 17:15

Tuesday, September 16, 2008

ZISC Colloquium
Speaker: Ran Canetti, Tel Aviv University
Title: How to Assert and Use Composable Security
Place: HG F5
Time: 17:15

Wednesday, September 10, 2008

Speaker: Sybille Fröschle, University Oldenburg
Title: Adding branching to the strand space model
Place: IFW C44
Time: 14:00

Tuesday, September 9, 2008

ZISC Colloquium
Speaker: Nur Zincir-Heywood, and Malcolm Heywood, Dalhousie University Halifax, Canada
Title: Classifying Encrypted Traffic without the Payload: A Case Study of SSH
Place: HG F5
Time: 17:15

Thursday and Friday, September 4-5, 2008

ZISC Workshop on Advanced Concepts of Access and Usage Control

Information is available at zisc.ethz.ch/events/workshop2008

Tuesday, September 2, 2008

Speaker: Matus Harvan
Title: Usage control with system call interposition
Place: IFW C44
Time: 14:00

Tuesday, August 26, 2008

Student end presentations

Speaker: Matthias Büchler
Title: Implementing Usage Control for Managed Information

Speaker: Michael Hänni
Title: Configuration of Services for Usage Control

Place: IFW C44
Time: 14:00

Thursday, August 21, 2008

Speaker: Knut Eckstein, European Space Agency/ESTEC
Title: My God, Space is Radioactive!
Place: IFW C44
Time: 14:00

Tuesday, August 12, 2008

Speaker: Christian Dax
Title: Alternation Elimination by Complementation
Place: IFW C44
Time: 11:30

Wednesday, August 6, 2008

Speaker: Peter Ryan, School of Computing Science, Newcastle University
Title: Prêt à Voter with Paillier Encryption
Place: IFW C44
Time: 14:00

Friday, July 25, 2008

Speaker: Van-Chan NGO
Title: Automated Verification of Asymmetric Encryption
Place: IFW C44
Time: 11:00

Wednesday, July 23, 2008

Speaker: Rafael Accorsi, Dept. of Telematics, University of Freiburg, Germany
Title: Automated Audits Based on Falsification
Place: IFW C44
Time: 14:00

Thursday, June 19, 2008

Speaker: Bruno Montalto
Title: Modelling an Adversary with Cryptanalytic Capabilities
Place: IFW C44
Time: 14:00

Fiday, June 13, 2008

Speaker: Simone Frau
Title: Petri Net Security Checker: Structural Non-interference at Work
Place: IFW D42
Time: 10:00

Wednesday, May 28, 2008

Speaker: Andreas Leitner
Title: Contract-based tests in the software process and environment
Place: IFW C44
Time: 14:00

Tuesday, May 27, 2008

Speaker: Domenico Salvati
Title: Talk on Ph.D. thesis with title "Management of Information System Risk"
Place: IFW C44
Time: 14:00

Speaker: Manuel Krucker
Title: A package for well-formedness checking and proof obligation generation for UML/OCL specifications
Place: IFW C44
Time: 15:15

ZISC Colloquium
Speaker: Urs P. Kuederli, Microsoft Switzerland
Title: Software Security Engineering and Development Today Security Development Lifecycle (SDL) - A Process to Develop More Secure Software
Place: HG F 5
Time: 17:15

Tuesday, May 20, 2008

ZISC Colloquium
Speaker: Prof. Guevara Noubir, College of Computer and Information Science Northeastern University Boston
Title: Heterogeneous Wireless Networks in Cooperative and Adversarial Settings
Place: HG F 5
Time: 17:15

Tuesday, May 13, 2008

ZISC Colloquium
Speaker: Jürg Eiholzer, Crypto AG
Title: Evaluation Standards for Information Security Systems
Place: HG F 5
Time: 17:15

Tuesday, April 29, 2008

ZISC Colloquium
Speaker: Volkmar Lotz, SAP Germany
Title: Towards Systematic Achievement of Compliance in Service-oriented Architectures: The MASTER Approach
Place: HG F 5
Time: 17:15

Tuesday, April 15, 2008

ZISC Colloquium
Speaker: Stefan Frei, ETH Zurich
Title: 0-Day Patch - A New security ecosystem metric
Place: HG F 5
Time: 17:15

Tuesday, April 8, 2008

ZISC Colloquium
Speaker: Prof. Michael Backes, Saarland University
Title: On Machine-assisted Verification of Cryptography, and on Novel Eavesdropping Techniques
Place: HG F 5
Time: 17:15

Thursday, March 6, 2008

Speaker: Carsten Schuermann
Title: Trustworthy electronic elections
Place: IFW C 44
Time: 14:00

Tuesday, March 4, 2008

ZISC Colloquium
Speaker: Christoph Brandt
Title: How should security issues of worldwide distributed coarse-grain IT components in decentralized banking environments be handled?
Place: HG F 5
Time: 17:15

Friday, Februari 8, 2008

Speaker: Samuel Burri
Title: Dynamic Separation of Duty Enforcement with Automata
Place: IFW C 44
Time: 14:00

Speaker: Moritz Kuhn
Title: Testing Rich Web Applications for XSS Vulnerabilities
Place: IFW C 44
Time: 14:30

Tuesday, January 29, 2008

Speaker: Felix Klaedtke
Title: Ehrenfeucht-Fraisse Goes Automatic for Real Addition
Place: IFW C 44
Time: 14:00

Thursday, January 17, 2008

Student end presentations

Speaker: Andreas Schmidt
Title: Transformation of UML Use-case Diagrams to Access-control Policy Templates

Speaker: Martin Bill
Title: Association-related Model Transformations

Place: IFW C 44
Time: 10:00

Tuesday, January 15, 2008

Student end presentations

Speaker: Florian Schuetz
Title: Delegation in Usage Control

Speaker: Judith Rüesch
Title: Model Checking Usage Control Policies

Place: IFW D 42
Time: 14:00

 

Wichtiger Hinweis:
Diese Website wird in älteren Versionen von Netscape ohne graphische Elemente dargestellt. Die Funktionalität der Website ist aber trotzdem gewährleistet. Wenn Sie diese Website regelmässig benutzen, empfehlen wir Ihnen, auf Ihrem Computer einen aktuellen Browser zu installieren. Weitere Informationen finden Sie auf
folgender Seite.

Important Note:
The content in this site is accessible to any browser or Internet device, however, some graphics will display correctly only in the newer versions of Netscape. To get the most out of our site we suggest you upgrade to a newer browser.
More information

© 2011 ETH Zurich | Imprint | Disclaimer | 19 November 2010
top