Workshop on security and languages: Schedule

Palo Alto, California

30-31 October 1997


October 30, morning (9am to noon, with a break around 10:30am):

Jerry Saltzer: Back in the 1970's the security community came to the consensus that achieving security at the programming language level wouldn't work, because the trusted computing base that would be required is too large. What has changed?

Dave Wagner: The contribution of programming-language techniques to confinement and to building secure services

Robert Grimm: Access control in extensible systems (overview and papers)

Li Gong: The JDK1.2 security model (documentation and papers)

Jim Roskind: The Communicator 4.x security model

Sanjay Menon: The Microsoft Java security model (paper)

October 30, afternoon (1pm to 5pm or 6pm, with a break around 3pm):

Vijay Saraswat: On the design and use of class loaders in Java (web pages)

Sheng Liang: Making Java class loaders type-safe

Gün Sirer: The Kimera work on bytecode verification (web pages)

Raymie Stata: A type system for the Java Virtual Machine: subroutines (paper)

Stephen Freund: A type system for the Java Virtual Machine: initialization (abstract and slides)

Zhenyu Qian: A formal specification of Java Virtual Machine instructions (paper)

Rich Cohen: A defensive Java Virtual Machine (specification)

Vijay Saraswat: Declarative bytecode verification (web pages)

Eva Rose: Byte code verification on a Java Card (abstract)

October 30, evening (starting at 6:30pm, slowly):

Reception and dinner at the Garden Court Hotel (520 Cowper Street, Palo Alto)

October 31, morning (9am to noon, with a break around 10:30am):

Greg Morrisett: Type-safe assembly language: (paper and slides)

Peter Lee: Proof-carrying code (overview and papers)

Xavier Leroy or François Rouaix: Security properties of typed applets (paper)

Fred Schneider: Enforceable security policies and their enforcement

Robbert VanRenesse: Tacoma 2 Cornell active network

October 31, afternoon (1pm to 5pm or 6pm, with a break around 3pm):

Andrew Wright: Information-flow analysis for security

Jon Riecke or Nevin Heintze: The SLam calculus (paper and slides)

Andrew Myers: Decentralized information-flow control (paper and slides)

General discussion


Martín Abadi