Timetable

17 18 19 20 21 22 23 24 25 26 27 28 29 30
Sun Mon Tue Wed Thu Fri Sat Sun Mon Tue Wed Thu Fri Sat
08.00-09.00 arrivals between 18.00 and 21.00 breakfast departures
09.00-11.00 AC JS AC MMCS JS SC NCSM LSP CTP NCSM
11.00-11.30 coffee break coffee break
11.30-13.30 S3 AC JS CSP MMCS CTP LSP SC SC CTP
13.30-14.30 lunch
15.00-17.00 S1 CSP S2 JS S4 LSP CTP S5 NCSM S6
17.00-17.30 tea break tea break departures
17.30-19.30 CSP MMCS SC


S1: Introduction to Cryptography.
S2: Applied Cryptography.
S3: Control Flow Analysis for Security.
S4: Model checking using a logic of belief.
S5: Planning, logic programs and security protocols.
S6: Testing for spi Processes.

JS: Java Security (Gong).
NCSM: Nominal Calculi for Security and Mobility (Gordon).
CSP: Classification of Security Properties (Gorrieri / Focardi).
SC: Security Goals: packet trajectories and strand spaces (Guttman).
MMCS: Mathematical Models of Computer Security (Ryan).
AC: Access Control: policies, models, architectures and mechanisms (Samarati).
LSP: The Logic of Security Protocols (Syverson).
CTP: Cryptographic Technology and Protocols in E-Commerce (Yung).