[isabelle] LICS Workshop on Foundations of Computer Security (Call for Papers)

Please accept our apologies if you receive this in error or more than once.


Workshop on Foundations of Computer Security

August 9-10, 2009, Los Angeles, California, USA
Affiliated with LICS'09.

Papers due: 	April 14 (extended!), 2009
Notification of acceptance: 	May 29, 2009
Final papers: 	June 30, 2009

Computer security is an established field of computer science of both
theoretical and practical significance. In recent years, there has been
increasing interest in logic-based foundations for various methods in
computer security, including the formal specification, analysis and design
of security protocols and their applications, the formal definition
of various aspects of security such as access control mechanisms,
mobile code security and denial-of-service attacks, and the modeling
of information flow and its application to confidentiality policies,
system composition, and covert channel analysis.

The aim of the workshop FCS'09 is to provide a forum for continued
activity in different areas of computer security, bringing computer
security researchers in closer contact with the LICS community and giving
LICS attendees an opportunity to talk to experts in computer security,
on the one hand, and contribute to bridging the gap between logical
methods and computer security foundations, on the other.

We are interested both in new results in theories of computer security
and also in more exploratory presentations that examine open questions
and raise fundamental concerns about existing theories, as well as in
new results on developing and applying automated reasoning techniques and
tools for the formal specification and analysis of security protocols. We
thus solicit submissions of papers both on mature work (possibly based
on already published material) and on work in progress.

Possible topics include, but are not limited to:

Automated reasoning techniques, Composition issues, Formal specification,
Foundations of verification, Information flow analysis, Language-based
security, Logic-based design, Program transformation, Security models,
Static analysis, Statistical methods, Tools, Trust management for Access
control and resource usage control, Authentication, Availability and
denial of service, Covert channels, Confidentiality, Integrity and
privacy, Intrusion detection, Malicious code, Mobile code, Mutual
distrust, Privacy, Security policies, Security protocols

All submissions will be peer-reviewed. Authors of accepted papers must
guarantee that their paper will be presented at the workshop.

SUBMISSION ===========
Submissions should be at most 15 pages (a4paper, 11pt), including
references.  The cover page should include title, names of authors,
co-ordinates of the corresponding author, an abstract, and a list
of keywords. Submissions that are clearly too long may be rejected
immediately. Additional material intended for the referees but not
for publication in the final version - for example details of proofs -
may be placed in a clearly marked appendix that is not included in the
page limit.

Authors are invited to submit their papers electronically, as portable
document format (pdf) or postscript (ps); please, do not send files
formatted for work processing packages (e.g., Microsoft Word or
Wordperfect files). The only mechanism for paper submissions is via the
dedicated easychair submission web page.


Informal proceedings will be made available in electronic format and
they will be distributed to all participants of the workshop.

Participation to the workshop will be open to anybody willing to register.

Alessandro Armando (Universita di Genova, Italy)
Michael Backes (Saarland University and MPI-SWS, Germany)
Michele Bugliesi (Universita Ca Foscari, Italy)
Stephen Chong (Harvard University, USA)
Veronique Cortier (LORIA INRIA-Lorraine, France; co-chair)
Cas Cremers (ETH Zurich, Switzerland)
Stephanie Delaune (CNRS - ENS de Cachan, France)
Deepak Garg (Carnegie Mellon University, USA)
Dieter Gollman (Hamburg University of Technology, Germany)
Jerry den Hartog  (Technical University of Eindhoven, The Netherlands)
Jan Juerjens (The Open University and Microsoft Research (Cambridge), UK)
Ralf Kuesters (Universitat Trier, Germany)
Catherine Meadows (Naval Research Laboratory, USA)
Mark Ryan (University of Birmingham, UK)
Vitaly Shmatikov (University of Texas at Austin, USA; co-chair)
Luca Vigano (Universita di Verona, Italy)

The workshop is supported by the ANR-07-SESU-002 AVOTE.

This archive was generated by a fusion of Pipermail (Mailman edition) and MHonArc.