Days: Saturday, July 19th Sunday, July 20th Monday, July 21st Tuesday, July 22nd
View this program: with abstractssession overviewtalk overviewside by side with other conferences
08:45 | FLoC Plenary Talk: From Reachability to Temporal Specifications in Game Theory (abstract) |
View this program: with abstractssession overviewtalk overviewside by side with other conferences
08:45 | FLoC Panel: Publication Models in Computing Research: Is a Change Needed? Are We Ready for a Change? (abstract) |
View this program: with abstractssession overviewtalk overviewside by side with other conferences
09:00 | FLoC Olympic Games Big Screen: OWL Reasoner Evaluation (ORE 2014) (abstract) |
09:00 | FLoC Olympic Games Big Screen: Satisfiability Modulo Theories solver competition (SMT-COMP 2014) (abstract) |
View this program: with abstractssession overviewtalk overviewside by side with other conferences
08:45 | FLoC Panel: Computational Complexity and Logic: Theory vs. Experiments (abstract) |
10:45 | Declarative Policies for Capability Control (abstract) |
11:15 | Portable Software Fault Isolation (abstract) |
11:45 | Certificates for Verifiable Forensics (abstract) |
12:15 | Information flow monitoring as abstract interpretation for relational logic (abstract) |
14:30 | Synthesis of Masking Countermeasures against Side Channel Attacks (abstract) |
14:50 | Temporal Mode-Checking for Runtime Monitoring of Privacy Policies (abstract) |
15:10 | Program Verification through String Rewriting (abstract) |
15:30 | A Conference Management System with Verified Document Confidentiality (abstract) |
15:50 | VAC - Verifier of Administrative Role-based Access Control Policies (abstract) |
16:30 | Towards a Zero-Software Trusted Computing Base for Extensible Systems (abstract) |
17:30 | On Dynamic Flow-sensitive Floating-Label Systems (abstract) |
18:00 | Noninterference under Weak Memory Models (abstract) |
View this program: with abstractssession overviewtalk overviewside by side with other conferences
08:45 | FLoC Plenary Talk: Electronic voting: how logic can help? (abstract) |
View this program: with abstractssession overviewtalk overviewside by side with other conferences
View this program: with abstractssession overviewtalk overviewside by side with other conferences
10:15 | FLoC Olympic Games Big Screen: 7th IJCAR ATP System Competition (CASC-J7) (abstract) |
10:15 | FLoC Olympic Games Big Screen: Termination Competition (termCOMP 2014) (abstract) |
10:45 | Who’s Afraid of Which Bad Wolf? A Survey of IT Security Risk Awareness (abstract) |
11:15 | How task familiarity and cognitive predispositions impact behavior in a security game of timing (abstract) |
11:45 | Panel: Usability (abstract) |
14:30 | Attribute-based Encryption for Access Control Using Elementary Operations (abstract) |
15:00 | Automated Analysis and Synthesis of Block-Cipher Modes of Operation (abstract) |
15:30 | Certified Synthesis of Efficient Batch Verifiers (abstract) |
14:30 | FLoC Olympic Games: Answer Set Programming Modeling Competition 2014 (abstract) |
16:30 | A Peered Bulletin Board for Robust Use in Verifiable Voting Systems (abstract) |
17:00 | From input private to universally composable secure multiparty computation primitives (abstract) |
17:30 | Malleable Signatures: New Definitions and Delegatable Anonymous Credentials (abstract) |
View this program: with abstractssession overviewtalk overviewside by side with other conferences
10:45 | Decidability for Lightweight Diffie-Hellman Protocols (abstract) |
11:15 | Modeling Diffie-Hellman Derivability for Automated Analysis (abstract) |
11:45 | Actor Key Compromise: Consequences and Countermeasures (abstract) |
12:15 | A Sound Abstraction of the Parsing Problem (abstract) |
14:30 | Compositional Information-flow Security for Interactive Systems (abstract) |
15:00 | Stateful Declassification Policies for Event-Driven Programs (abstract) |
15:30 | Additive and multiplicative notions of leakage, and their capacities (abstract) |
View this program: with abstractssession overviewtalk overviewside by side with other conferences
View this program: with abstractssession overviewtalk overviewside by side with other conferences
16:30 | New Directions in Computed-Aided Cryptography (abstract) |
08:45 | VSL Keynote Talk: Ontology-Based Monitoring of Dynamic Systems (abstract) |
19:00 | VSL Public Lecture: Vienna Circle(s) - Between Philosophy and Science in Cultural Context (abstract) |
View this program: with abstractssession overviewtalk overviewside by side with other conferences
10:45 | The Complexity of Estimating Systematic Risk in Networks (abstract) |
11:15 | Automated Generation of Attack Trees (abstract) |
11:45 | Mignis: A semantic based tool for firewall configuration (abstract) |
12:15 | Provably Sound Browser-Based Enforcement of Web Session Integrity (abstract) |
View this program: with abstractssession overviewtalk overviewside by side with other conferences
16:30 | FLoC Olympic Games Award Ceremony 2 (abstract) |
18:00 | Lifetime Achievement Award (abstract) |
18:10 | Lifetime Achievement Award (abstract) |
18:20 | EMCL Distinguished Alumni Award (abstract) |
18:30 | FLoC Closing Week 2 (abstract) |
View this program: with abstractssession overviewtalk overviewside by side with other conferences
14:30 | Privacy in the Age of Augmented Reality (abstract) |
15:30 | Balancing Societal Security and Individual Privacy: Accountable Escrow System (abstract) |
16:30 | TUC: Time-sensitive and Modular Analysis of Anonymous Communication (abstract) |
17:00 | Differential Privacy: An Economic Method for Choosing Epsilon (abstract) |
17:30 | Proving differential privacy in Hoare logic (abstract) |
18:00 | Surveillance and Privacy (abstract) |
08:45 | VSL Keynote Talk: Verification of Computer Systems with Model Checking (abstract) |