Second NJITES Cybersecurity Symposium, April 28, 2003

[At least 2 of the talks involve types... DD]

                   Second NJITES Symposium on
               Cybersecurity and Trustworthy Software

                    Monday, April 28, 2003
                Stevens Institute of Technology
                    Hoboken, New Jersey, USA

Symposium web site: http://www.njites.org/Symposium/

E-mail inquiries: njites-symposium@cs.stevens-tech.edu

Register for future announcements:

This symposium brings together researchers and practitioners, in
government, academia and industry, to discuss problems and possible
solutions in cyber security, both for e-commerce and for homeland
security. A particular emphasis of the symposium is to bring together
those interested in communications security and in end-to-end

8:30-9:15 Registration and breakfast

9:15 Opening remarks

9:30-10:30 Keynote talk: Computer Security.
       Ed Felten, Princeton University.

10:30-11:00 Coffee break.

11:00-11:30 Cryptology and non-computer security.
       Matt Blaze, AT&T Labs-Research.

11:30-12:00 Privacy-protecting statistics computation:
       theory and practice.
       Rebecca Wright, Stevens Institute of Technology.

12:00-12:30 Flexible Regulation of Distributed Coalitions.
       Naftaly Minsky, Rutgers University.

12:30-2:00 Lunch.

2:00-3:00 Keynote talk: Toward fixing the "compliance defects"
       of public key cryptography.
       Michael Reiter, Carnegie Mellon University.

3:00-3:30 Coffee break.

3:30-4:00 Dependent session types for safety
       in distributed communications.
       Adriana Compagnoni, Stevens Institute of Technology.

4:00-4:30 Improving security with distributed cryptography.
       Tal Rabin, IBM Hawthorne Research.

4:30-5:00 Type-Based Distributed Access Control.
       Tom Chothia, Stevens Institute of Technology.
5:00 Concluding remarks.