![]() |
|
ZISC Colloquium
Speaker: Luke O'Connor, Zurich Financial Services
Title: Some Black Swans in IT Security
Time: 17:15h
Place: HG F5
Speaker: Mohammad Torabi Dashti
Title: An open problem in combinatorics with applications to security
Time: 14:00
Place: IFW C 44
Speaker: Richard Waldinger, Artificial Intelligence Center, SRI International (link)
Title: Recursive Plans and Imperative Programs Revisited: Deductive Synthesis
Time: 15:00
Place: IFW D 42
Speaker: Jean-Raymond Abrial
Title: A new construction of the Real Number
Time: 15:00-16:00
Place: IFW D 42
ZISC Colloquium
Speaker: Claudia Diaz, Department of Electrical Engineering, K.U.Leuven
Title: The wisdom of Crowds: attacks and optimal constructions
Time: 17:15h
Place: HG F5
Speaker: Ueli Maurer
Title: Abstract Cryptography (and Security)
Time: 14:00
Place: IFW C 44
ZISC Colloquium
Speaker: Lukas Ruf, Consecom AG, Zurich
Title: Virtualization - Opportunities, Threats and Challenges
Time: 17:15h
Place: HG F5
ZISC Colloquium
Speaker: Luca Viganò, Università di Verona
Title: Automated Validation of Trust and Security of Service-oriented Architectures
Time: 17:15h
Place: HG F5
Speaker: Manuel Clavel, IMDEA Software & Univ. Complutense, Madrid, Spain
Title: Automatic Generation and Analysis of Smart, Security-Aware GUI Models
Time: 14:00
Place: IFW C 44
ZISC Colloquium
Speaker: Graham Steel, Laboratoire Spécification et Vérification, ENS-Cachan
Title: Differential attacks on PIN Process APIs
Time: 17:15h
Place: HG F5
Speaker: Silvo Ranise
Title: Verifying the Interplay of Authorization Policies and Workflow in Service-Oriented Architectures
Time: 14:00
Place: IFW D 42
Speaker: Sylvain Hallé
Title: Runtime monitoring of a quantified temporal logic: an application to interface contracts in web applications
Time: 14:00
Place: IFW C 44
ZISC Colloquium
Speaker: Jean-Pierre Hubaux, EPFL, Lausanne
Title: Security Mechanisms with Selfish Players in Wireless Networks
Time: 17:15h
Place: HG F5
Speaker: Mario Frank
Title: Hybrid role mining
Time: 14:00
Place: IFW C 44
Speaker: Matus Harvan
Title: State-based Usage Control Enforcement with Data Flow Tracking using System
Call Interposition
Time: 14:00
Place: IFW C 44
Speaker: Christian Dax
Title: Specification Languages for Stutter-Invariant Regular Properties
Time: 13:30
Place: IFW D 44
ZISC Colloquium
Speaker: Refik Molva, EURECOM, Sophia-Antipolis
Title: Safebook - a decentralized online social network for privacy
Time: 17:15h
Place: HG F5
Speaker: Matthias Schmalz
Title: Counterexamples in Probabilistic LTL Model Checking for Markov Chains
Time: 14:00
Place: IFW C 44
Speaker: Michael Schläpfer
Title: Automatic Generation of Smart&SecGUIs from Security Design Models
Time: 14:00
Place: IFW C 44
Speaker: Eugen Zalinescu
Title: Automated Computational Verification for Cryptographic Protocol Implementations
Time: 13:00
Place: IFW C 44
Speaker: Jan Alsenz
Title: Usage Control at the CPU Level
Time: 14:00
Place: IFW D 42
Speaker: Jan Alsenz (postponed to June 2)
Title: Usage Control at the CPU Level
Speaker: Matthias Buechler
Title: Usage Control Enforcement with an Application to the X11 Protocol
Speaker: Jan-Filip Zagalak
Title: Information Flow Analysis on the Java Byte Code Level
Place: IFW C 44
Time: 14:00 - 15:30
Speaker: Prof. Burkhart Wolff
Title: HOL-Boogie — An Interactive Prover-Backend for the Verifying C Compiler
Place: IFW C 44
Time: 14:00
Speaker: Jean-Raymond Abrial
Title: Event-B Model Decomposition
Place: IFW C 44
Time: 14:00
Speaker: Michael Kirkpatrick
Title: Toward Event-Driven Context-Dependent Access Control
Place: IFW C 44
Time: 14:00
Speaker: Prof. Maria Paola Bonacina
Title: Decision procedures for software verification
Place: IFW C 44
Time: 14:00
Speaker: Carl-Daniel Hailfinger
Title: Automatable dependency analysis of networked processes
Place: IFW C 44
Time: 14:00
Speaker: Andreas Fuerst
Title: Design Patterns in Event-B and Their Tool Support
Place: IFW C 44
Time: 14:00
Speaker: Bruno Conchinha Montalto
Title: Modeling and Reasoning About an Attacker with Cryptanalytical Capabilities
Place: IFW C 44
Time: 14:00
Speaker: Cas Cremers
Title: From Dolev-Yao to Strong Adaptive Corruption: Analyzing Security in the Presence of Compromising Adversaries
Place: IFW C 44
Time: 14:00
Speaker: Sergiu Bursuc
Title: Deducibility constraints
Place: IFW C 44
Time: 14:00
Speaker: Dr. Balder ten Cate
Title: XPath: expressive power and static analysis
Place: IFW C 44
Time: 14:00
Speaker: Dr. Marina Egea González
Title: An executable Formal Semantics for OCL with Applications to Model Analysis and Validation
Place: IFW C 44
Time: 11:00
Student semester end presentation
Speaker: Lukas Stuker
Title: Construction of the Sliding Window Protocol by Step-wise Refinement
Place: IFW C 44
Time: 14:00
Wichtiger Hinweis:
Diese Website wird in älteren Versionen von Netscape ohne
graphische Elemente dargestellt. Die Funktionalität der
Website ist aber trotzdem gewährleistet. Wenn Sie diese
Website regelmässig benutzen, empfehlen wir Ihnen, auf
Ihrem Computer einen aktuellen Browser zu installieren. Weitere
Informationen finden Sie auf
folgender
Seite.
Important Note:
The content in this site is accessible to any browser or
Internet device, however, some graphics will display correctly
only in the newer versions of Netscape. To get the most out of
our site we suggest you upgrade to a newer browser.
More
information