4th International Workshop in Formal Aspects in Security and Trust (FAST 2006) www.iit.cnr.it/FAST2006 Hamilton, Ontario, Canada,August 26-27 2006 Affiliated 14th Formal Methods Symposium (FM’06) and sponsored by IFIP WG 1.7 "Theoretical Foundations of Security Analysis and Design" Preliminary program Saturday, August 26 2006. 9.00-10.30 Session 1 * Trust Engineering via Cryptographic Protocols (Invited Talk) - Joshua Guttman. * A semantic paradigm for component-based specification integrating a notion of security risk - Gyrd Brændeland and Ketil Stølen. 10.30-11.00 Coffee break 11.00-12.30 Session 2: Models for Security * A Formal Specification of the MIDP 2.0 Security Model - Santiago Zanella Béguelin, Gustavo Betarte and Carlos Luna. * Locality-based Security Policies - Terkel K. Tolstrup, Flemming Nielson and René Rydhof Hansen. * Timed Calculus of Cryptographic Communication - Johannes Borgström, Olga Grinchtein and Simon Kramer. 12.30-14.00 Lunch break 14.00-15.30 Session 3: Information Flow * A Comparison of Semantic Models for Noninterference - Chenyi Zhang and Ron van der Meyden. * Hiding information in Multi Level Systems - Ruggero Lanotte and Danièle Beauquier. * Secure Information Flow, Refinement, and Transformation - Fredrik Seehusen and Ketil Stølen. 15.30-16.00 Coffee break 16.00-17:30 Session 4: Verification, Analysis and Synthesis * A theorem-proving approach to verification of fair non-repudiation - Kun Wei and James Heather. * Where can an Insider attack? - Christian W. Probst, Rene Rydhof Hansen and Flemming Nielson. * A tool for the Synthesis of Security Automata - Ilaria Matteucci. Sunday, August 27 2006 9.00-10.30 Session 5: Trust management * From Simulations to Theorems: A Position Paper on Research in the Field of Computational Trust - Karl Krukow and Mogens Nielsen. * Program Partitioning using Dynamic Trust - Dan Søndergaard, Christian W. Probst, Christian Damsgaard Jensen and Rene Rydhof Hansen. * A New Trust Model Based on Advanced D-S Evidence Theory for P2P Networks - Chunqi Tian, Shihong Zou, Wendong Wang and Shiduan Cheng. 10.30-11.00 Coffee break 11.00-12.30 Session 6: Access control and anonimity * Measuring Anonymity with Relative Entropy - Yuxin Deng, Jun Pang and Peng Wu. * A Classification of Delegation Schemes for Attribute Authority - Ludwig Seitz, Erik Rissanen and Babak Sadighi. * Using Colored Petri Net to Model and Analyze Workflow with Separation of Duty Constraints - Yahui Lu, Li Zhang and Jiaguang Sun. 12.30-14.00 Lunch break 14.00-15.30 Session 7: Games and analysis for security * Strategic games on defense trees - Stefano Bistarelli, Pamela Peretti and Marco Dall'Aglio. * Game-based Criterion Partition Applied to Computational Soundness of Adaptive Security - Marion Daubignard, Romain Janvier, Yassine Lakhnech and Laurent Mazare. * Formalizing and Analyzing Sender Invariance - Paul Hankes Drielsma, Sebastian Mödersheim, Luca Vigano` and David Basin. 15.30-16.00 End of the workshop and coffee break