posted by system || 6584 views || tracked by 8 users: [display]

GIPSy 2011 : 2nd Workshop on Games, Logic and Security

FacebookTwitterLinkedInGoogle

Link: http://www.irisa.fr/prive/Sophie.Pinchinat/GIPSy/gipsy11.html
 
When Oct 25, 2011 - Oct 27, 2011
Where Rennes, France
Submission Deadline Oct 9, 2011
Notification Due Oct 11, 2011
Categories    games   logic   security   verification
 

Call For Papers

Security and privacy problems in computer networks and mobile applications often stem from the interaction between agents of the network (which can be individuals as well as devices or softwares acting autonomously). Modeling the interaction between agents is therefore essential to address security problems appropriately. Game theory and logic are the most prominent frameworks for the formal treatment of interaction. They permit not only to model and represent this interaction between agents, but they also lead to the development of applicable algorithms and decision procedures. In the past two decades, a number of logical frameworks and game-theoretic approaches have been proposed to model and analyze computer networks from the security point of view, sometimes resorting to non-classical logics (such as epistemic or intuitionistic logics).

The main goal of this workshop is to gather researchers interested in games, logic and security (in a broad sense), and to offer a privileged forum to present their work and exchange ideas on these topics.

The following invited tutorials are scheduled:

Gilles Barthe, IMDEA Software Institute Research, Madrid
Probabilistic Reasoning about Differential Privacy

Anne Broadbent, Institute for Quantum Computing & Department of Combinatorics and Optimization, University of Waterloo
Quantum Nonlocal Games and Cryptography

Jean-Pierre Hubaux, EPFL Lausanne
Designing Network Security and Privacy Mechanisms: How Game Theory Can Help

Mark Ryan, University of Birmingham
Verifying Real-Life Protocols: Theory and Two Cases

Moshe Vardi, Department of Computer Science, Rice University
The Rise and Fall of LTL

Apart from the invited talks, participants have the opportunity to give short talks (approximately 20 minutes). Selection will be made on the basis of an extended abstract of at most 2 pages.

The registration is free but mandatory. Lunches are included in the registration.

Important dates:
- Submission deadline: 9th October 2011
- Notification to authors: 11th October 2011
- Deadline for registration: 13th October 2011
- Workshop: 25th-27th October 2011

We will be able to cover part of travel and accommodation costs for a limited number of participants (especially students). For information, please contact us at gipsy2011@listes.irisa.fr by the 9th of October 2011.

Scientific committee:
- Guillaume Aucher (Université de Rennes 1 - INRIA)
- Nathalie Bertrand (INRIA Rennes)
- Sébastien Gambs (Université de Rennes 1 - INRIA)
- Sophie Pinchinat (Université de Rennes 1)

Local organization:
- Laurence Dinh
- Lydie Mabil
- Bastien Maubert

Related Resources

MDA AI&PR 2023   18th International Conference on Mass Data Analysis of Images and Signals with Applications in Medicine, r/g/b Biotechnology, Food Industries and Dietetics, Biometry and Security,
BIOS 2022   8th International Conference on Bioinformatics & Biosciences
NordSec 2022   The 27th Nordic Conference on Secure IT Systems
EvoCompAISecurity&Privacy 2022   Evolutionary Computing for AI-Driven Security and Privacy: Advancing the state-of-the-art applications
CEVVE 2022   2022 International Conference on Electric Vehicle and Vehicle Engineering (CEVVE 2022)
ICAISC 2023   International Conference on Artificial Intelligence and Soft Computing
IJCGA 2022   International Journal of Computer Graphics & Animation
SPACE 2022   12th International Conference on Security, Privacy and Applied Cryptographic Engineering (SPACE 2022)
IJANS 2022   International Journal on AdHoc Networking Systems
ICLA 2022   10th Indian Conference on Logic and its Applications