posted by user: sadeghd || 10684 views || tracked by 25 users: [display]

POST 2012 : The First Conference on Principles of Security and Trust


Conference Series : Principles of Security and Trust
When Mar 25, 2012 - Mar 31, 2012
Where Tallinn, Estonia
Abstract Registration Due Oct 7, 2011
Submission Deadline Oct 14, 2011
Notification Due Dec 16, 2011
Final Version Due Jan 6, 2012
Categories    security   formalism   trust

Call For Papers

POST 2012
First Conference on
Principles of Security and Trust

Tallinn, Estonia

A Main Conference of ETAPS

European joint conferences on
Theory and Practice of Software

Conference Description

Principles of Security and Trust is a broad forum related to
the theoretical and foundational aspects of security and
trust. Papers of many kinds are welcome: new theoretical
results, practical applications of existing foundational
ideas, and innovative theoretical approaches stimulated by
pressing practical problems.

POST combines and replaces a number of successful and
longstanding workshops in this area: Automated Reasoning and
Security Protocol Analysis (ARSPA), Formal Aspects of Security
and Trust (FAST), Security in Concurrency (SecCo), and the
Workshop on Issues in the Theory of Security (WITS). A subset
of these events met jointly as an event affiliated with ETAPS
in 2011 under the name Theory of Security and Applications

POST is now a member conference of the European Joint
Conferences on Theory and Practice of Software (ETAPS), which
is the primary European forum for academic and industrial
researchers working on topics relating to Software
Science. ETAPS 2012 is the 15th joint conference in this

Call for Papers

We seek submissions proposing theories to clarify security and
trust within computer science; submissions establishing new
results in existing theories; and also submissions raising
fundamental concerns about existing theories. We welcome new
techniques and tools to automate reasoning within such
theories, or to solve security and trust problems. Case
studies that reflect the strengths and limitations of
foundational approaches are also welcome, as are more
exploratory presentations on open questions.

Areas of interest include:

Access control Anonymity Authentication

Availability Cloud security Confidentiality

Covert channels Crypto foundations Economic issues

Information flow Integrity Languages for security

Malicious code Mobile code Models and policies

Privacy Provenance Reputation and trust

Resource usage Risk assessment Security architectures

Security protocols Trust management Web service security

Productive techniques have included automated reasoning,
compositionality and transformation, language-based methods,
logical formalization, quantitative methods, and static

Rebuttal phase

Authors will be given a 60 hour period to read and respond to
the reviews of their papers before the PC meeting. This
process will not, however, provide additional iterations.

Submission Guidelines

Papers must be written in English, unpublished and not
submitted for publication elsewhere. The proceedings will be
published in the Springer-Verlag Lecture Notes in Computer
Science series (currently pending).

Submissions must be in PDF format, formatted in the LNCS style
(as specified on this page) and at most 20 pages long. The 20
pages must include references and all material intended for

Additional material, that is not to be included in the final
version, but may help assessing the merits of the submission -
for example details of proofs - may be placed in a clearly
marked appendix that is not included in the page limit. ETAPS
referees are at liberty to ignore appendices, and papers must
be understandable without them.

Papers are submitted via the Easychair conference management
system (not yet open).

A special issue of the Journal of Computer Security will be
devoted to selected papers of POST 2012. Submissions will be
solicited after the meeting.

Important Dates

7 October 2011: Submission deadline for abstracts (strict)
14 October 2011: Submission deadline for full papers (strict)
28 November 2011: Rebuttal phase begins
30 November 2011: Rebuttal phase ends
16 December 2011: Notification of acceptance
6 January 2012: Camera-ready versions due

The submission deadline for papers is strict (site will close
at 23:59 GMT-11). Submission of an abstract implies no
obligation to submit a full version; abstracts with no
corresponding full versions by the full paper deadline will be
considered as withdrawn.

Invited Speaker

Cynthia Dwork, Microsoft Research

Programme Committee

Michael Backes, Saarland and MPI-SWS, DE
Anindya Banerjee, IMDEA Software Institute, ES
Gilles Barthe, IMDEA Software Institute, ES
David Basin, ETH Zurich, CH
Veronique Cortier, CNRS, Loria, FR
Pierpaolo Degano, Università di Pisa, IT (co-chair)
Andrew Gordon, Microsoft Research and University of Edinburgh, UK
Joshua Guttman, WPI, USA (co-chair)
Ralf Küsters, Universität Trier, DE
Steve Kremer, INRIA, ENS Cachan, FR
Peeter Laud, Cybernetica AS and University of Tartu, EE
Gavin Lowe, Oxford University, UK
Heiko Mantel, Technische Universität Darmstadt, DE
Sjouke Mauw, Université du Luxembourg, LU
Catherine Meadows, NRL, USA
John C Mitchell, Stanford, USA
Sebastian Mödersheim, DTU, DK
Carroll Morgan, University of New South Wales, AU
Mogens Nielsen, University of Aarhus, DK
Catuscia Palamidessi, INRIA, École Polytechnique, FR
Andrei Sabelfeld, Chalmers, SE
Nikhil Swamy, Microsoft Research, USA
Luca Viganò, Università di Verona, IT

Related Resources

Sensors (MDPI) 2020   Special Issue on Security, Trust and Privacy in New Computing Environments
Spec.Issue on Social Informatics: Scopus 2021   Journal of Social and Business Informatics - Acta Informatica Pragensia
Sensors (MDPI) SI 2021   Sensors SI on Security, Trust and Privacy in New Computing Environments
ITE 2021   2nd International Conference on Integrating Technology in Education
SCN SI 2020   Security and Communication Networks, SI on Security, Trust, and Privacy in Machine Learning-Based Internet of Things
CiVEJ 2020   Civil Engineering and Urban Planning: An International Journal
Future Internet SI 2020   Future Internet SI on Information and Future Internet Security, Trust and Privacy
JISA-CYBER-SEC 2020   Special Issue on Trends in Cybersecurity, Journal of Information Security and Applications, Elsevier
ECML PKDD 2020   European Conference on Machine Learning and Principles and Practice of Knowledge Discovery in Databases
CCNC 2021   IEEE Consumer Communications & Networking Conference