posted by user: sadeghd || 13268 views || tracked by 25 users: [display]

POST 2012 : The First Conference on Principles of Security and Trust

FacebookTwitterLinkedInGoogle


Conference Series : Principles of Security and Trust
 
Link: http://web.cs.wpi.edu/~guttman/post12/
 
When Mar 25, 2012 - Mar 31, 2012
Where Tallinn, Estonia
Abstract Registration Due Oct 7, 2011
Submission Deadline Oct 14, 2011
Notification Due Dec 16, 2011
Final Version Due Jan 6, 2012
Categories    security   formalism   trust
 

Call For Papers

POST 2012
First Conference on
Principles of Security and Trust

Tallinn, Estonia

A Main Conference of ETAPS

European joint conferences on
Theory and Practice of Software

http://www.etaps.org/2012
http://web.cs.wpi.edu/~guttman/post12/

Conference Description

Principles of Security and Trust is a broad forum related to
the theoretical and foundational aspects of security and
trust. Papers of many kinds are welcome: new theoretical
results, practical applications of existing foundational
ideas, and innovative theoretical approaches stimulated by
pressing practical problems.

POST combines and replaces a number of successful and
longstanding workshops in this area: Automated Reasoning and
Security Protocol Analysis (ARSPA), Formal Aspects of Security
and Trust (FAST), Security in Concurrency (SecCo), and the
Workshop on Issues in the Theory of Security (WITS). A subset
of these events met jointly as an event affiliated with ETAPS
in 2011 under the name Theory of Security and Applications
(TOSCA).

POST is now a member conference of the European Joint
Conferences on Theory and Practice of Software (ETAPS), which
is the primary European forum for academic and industrial
researchers working on topics relating to Software
Science. ETAPS 2012 is the 15th joint conference in this
series.

Call for Papers

We seek submissions proposing theories to clarify security and
trust within computer science; submissions establishing new
results in existing theories; and also submissions raising
fundamental concerns about existing theories. We welcome new
techniques and tools to automate reasoning within such
theories, or to solve security and trust problems. Case
studies that reflect the strengths and limitations of
foundational approaches are also welcome, as are more
exploratory presentations on open questions.

Areas of interest include:

Access control Anonymity Authentication

Availability Cloud security Confidentiality

Covert channels Crypto foundations Economic issues

Information flow Integrity Languages for security

Malicious code Mobile code Models and policies

Privacy Provenance Reputation and trust

Resource usage Risk assessment Security architectures

Security protocols Trust management Web service security

Productive techniques have included automated reasoning,
compositionality and transformation, language-based methods,
logical formalization, quantitative methods, and static
analysis.

Rebuttal phase

Authors will be given a 60 hour period to read and respond to
the reviews of their papers before the PC meeting. This
process will not, however, provide additional iterations.

Submission Guidelines

Papers must be written in English, unpublished and not
submitted for publication elsewhere. The proceedings will be
published in the Springer-Verlag Lecture Notes in Computer
Science series (currently pending).

Submissions must be in PDF format, formatted in the LNCS style
(as specified on this page) and at most 20 pages long. The 20
pages must include references and all material intended for
publication.

Additional material, that is not to be included in the final
version, but may help assessing the merits of the submission -
for example details of proofs - may be placed in a clearly
marked appendix that is not included in the page limit. ETAPS
referees are at liberty to ignore appendices, and papers must
be understandable without them.

Papers are submitted via the Easychair conference management
system (not yet open).

A special issue of the Journal of Computer Security will be
devoted to selected papers of POST 2012. Submissions will be
solicited after the meeting.

Important Dates

7 October 2011: Submission deadline for abstracts (strict)
14 October 2011: Submission deadline for full papers (strict)
28 November 2011: Rebuttal phase begins
30 November 2011: Rebuttal phase ends
16 December 2011: Notification of acceptance
6 January 2012: Camera-ready versions due

The submission deadline for papers is strict (site will close
at 23:59 GMT-11). Submission of an abstract implies no
obligation to submit a full version; abstracts with no
corresponding full versions by the full paper deadline will be
considered as withdrawn.

Invited Speaker

Cynthia Dwork, Microsoft Research

Programme Committee

Michael Backes, Saarland and MPI-SWS, DE
Anindya Banerjee, IMDEA Software Institute, ES
Gilles Barthe, IMDEA Software Institute, ES
David Basin, ETH Zurich, CH
Veronique Cortier, CNRS, Loria, FR
Pierpaolo Degano, Università di Pisa, IT (co-chair)
Andrew Gordon, Microsoft Research and University of Edinburgh, UK
Joshua Guttman, WPI, USA (co-chair)
Ralf Küsters, Universität Trier, DE
Steve Kremer, INRIA, ENS Cachan, FR
Peeter Laud, Cybernetica AS and University of Tartu, EE
Gavin Lowe, Oxford University, UK
Heiko Mantel, Technische Universität Darmstadt, DE
Sjouke Mauw, Université du Luxembourg, LU
Catherine Meadows, NRL, USA
John C Mitchell, Stanford, USA
Sebastian Mödersheim, DTU, DK
Carroll Morgan, University of New South Wales, AU
Mogens Nielsen, University of Aarhus, DK
Catuscia Palamidessi, INRIA, École Polytechnique, FR
Andrei Sabelfeld, Chalmers, SE
Nikhil Swamy, Microsoft Research, USA
Luca Viganò, Università di Verona, IT

Related Resources

Security 2025   Special Issue on Recent Advances in Security, Privacy, and Trust
IEEE COINS 2024   IEEE COINS 2024 - London, UK - July 29-31 - Hybrid (In-Person & Virtual)
CEVVE 2024   2024 2nd International Conference on Electric Vehicle and Vehicle Engineering (CEVVE 2024)
ECML-PKDD 2024   European Conference on Machine Learning and Principles and Practice of Knowledge Discovery in Databases
CSW 2024   2024 3rd International Conference on Cyber Security
KR 2024   Principles of Knowledge Representation and Reasoning
CP 2024   Principles and Practice of Constraint Programming
ICISS 2024   The 20th International Conference on Information Systems Security (ICISS-2024)
ECTIJ 2024   Economics, Commerce and Trade Management: An International Journal
ACM SIGSIM PADS 2024   38th ACM SIGSIM Conference on Principles of Advanced Discrete Simulation