9:30 -- 10:00 | |
Welcome and coffee break |
10:00 -- 12:00 | |
Invited tutorial "The rise and fall of LTL" Moshe Vardi |
12:30 -- 14:00 | |
Lunch |
14:00 -- 16:00 | |
Contributed talks |
"Imperfect information in fair non-repudiation protocols" Matthijs Melissen | ||
"Dynamics in delegation and revocation schemes: a logical approach" Valerio Genovese | ||
|
|
"ATL with strategy contexts: expressiveness and model checking" Nicolas Markey |
"A rooted Tableau for BCTL*" John McCabe | ||
16:00 -- 16:30 | | Coffee break |
16:30 -- 18:30 |
Invited tutorial "Quantum non-local games and cryptography" Anne Broadbent |
9:00 -- 11:00 | |
Invited tutorial "Designing network security and privacy mechanisms: how game theory can help" Jean-Pierre Hubaux |
11:00 -- 11:30 | |
Coffee break |
11:30 -- 12:30 | |
Contributed talks |
| | "Uniform strategies" Bastien Maubert |
| | "Partial-observation stochastic games: how to win when belief fails" Laurent Doyen |
12:30 -- 14:00 | |
Lunch |
14:00 -- 16:00 |
Invited tutorial "Verifying real-life protocols: theory and two cases" Mark Ryan | |
16:00 -- 16:30 | Coffee break | |
16:30 -- 18:30 | |
Contributed talks |
| | "Model-checking information flow reactive systems" Rayna Dimitrova |
| | "Rational agents near cut cake" Nikolay Shilov |
| | "A conditional constructive logic for access control and its sequent calculus" Valerio Genovese |
"Towards the automatic verification of e-voting properties in the ADM logic" Mehdi Talbi | ||
(dinner at La Reserve in downtown Rennes) |
9:00 -- 11:00 | |
Invited tutorial "Probabilistic reasoning about differential privacy" Gilles Barthe |
11:00 -- 11:30 | |
Coffee break |
11:30 -- 12:30 | |
Contributed talks |
| | "Differential privacy: the trade-off between leakage and utility" Mario Alvim |
| | "Representing privacy regulations with deontico-temporal operators" Guillaume Piolle |
12:30 -- 14:00 | |
Lunch |
14:00 -- 15:30 |
Satellite event (Amphitheater A): "And logic begat computer science: when giants roamed the earth" Moshe Vardi |