posted by user: sierrauy || 2577 views || tracked by 6 users: [display]

FCS 2009 : Foundations of Computer Security


When Aug 9, 2009 - Aug 10, 2009
Where Los Angeles, California, USA
Submission Deadline Apr 7, 2009
Notification Due May 29, 2009
Final Version Due Jun 30, 2009
Categories    security   logic

Call For Papers


Workshop on Foundations of Computer Security

August 9-10, 2009, Los Angeles, California, USA
Affiliated with LICS'09.

Papers due: April 7, 2009
Notification of acceptance: May 29, 2009
Final papers: June 30, 2009

Computer security is an established field of computer science of both
theoretical and practical significance. In recent years, there has
been increasing interest in logic-based foundations for various
methods in computer security, including the formal specification,
analysis and design of security protocols and their applications, the
formal definition of various aspects of security such as access
control mechanisms, mobile code security and denial-of-service
attacks, and the modeling of information flow and its application to
confidentiality policies, system composition, and covert channel

The aim of the workshop FCS'09 is to provide a forum for continued
activity in different areas of computer security, bringing computer
security researchers in closer contact with the LICS community and
giving LICS attendees an opportunity to talk to experts in computer
security, on the one hand, and contribute to bridging the gap between
logical methods and computer security foundations, on the other.

We are interested both in new results in theories of computer security
and also in more exploratory presentations that examine open questions
and raise fundamental concerns about existing theories, as well as in
new results on developing and applying automated reasoning techniques
and tools for the formal specification and analysis of security
protocols. We thus solicit submissions of papers both on mature work
(possibly based on already published material) and on work in progress.

Possible topics include, but are not limited to:
Automated reasoning techniques, Composition issues, Formal
specification, Foundations of verification, Information flow analysis,
Language-based security, Logic-based design, Program transformation,
Security models, Static analysis, Statistical methods, Tools, Trust
for Access control and resource usage control, Authentication,
Availability and denial of service, Covert channels, Confidentiality,
Integrity and privacy, Intrusion detection, Malicious code, Mobile
code, Mutual distrust, Privacy, Security policies, Security protocols

All submissions will be peer-reviewed. Authors of accepted papers must
guarantee that their paper will be presented at the workshop.

Submissions should be at most 15 pages (a4paper, 11pt), including
The cover page should include title, names of authors, co-ordinates of
the corresponding author, an abstract, and a list of
keywords. Submissions that are clearly too long may be rejected
immediately. Additional material intended for the referees but not for
publication in the final version - for example details of proofs - may
be placed in a clearly marked appendix that is not included in the
page limit.

Authors are invited to submit their papers electronically, as portable
document format (pdf) or postscript (ps); please, do not send files
formatted for work processing packages (e.g., Microsoft Word or
Wordperfect files). The only mechanism for paper submissions is via
the dedicated easychair submission web page.

Informal proceedings will be made available in electronic format and
they will be distributed to all participants of the workshop.

Participation to the workshop will be open to anybody willing to register.

Alessandro Armando (Università di Genova, Italy)
Michael Backes (Saarland University and MPI-SWS, Germany)
Michele Bugliesi (Università Ca' Foscari, Italy)
Stephen Chong (Harvard University, USA)
Véronique Cortier (LORIA INRIA-Lorraine, France; co-chair)
Cas Cremers (ETH Zurich, Switzerland)
Stéphanie Delaune (CNRS - ENS de Cachan, France)
Deepak Garg (Carnegie Mellon University, USA)
Dieter Gollman (Hamburg University of Technology, Germany)
Jerry den Hartog (Technical University of Eindhoven, The Netherlands)
Jan Jürjens (The Open University and Microsoft Research (Cambridge), UK)
Ralf Küsters (Universität Trier, Germany)
Catherine Meadows (Naval Research Laboratory, USA)
Mark Ryan (University of Birmingham, UK)
Vitaly Shmatikov (University of Texas at Austin, USA; co-chair)
Luca Viganò (Università di Verona, Italy)

The workshop is supported by the ANR project AVOTE.

Related Resources

PAKDD 2021   Pacific-Asia Conference on Knowledge Discovery and Data Mining
IEEE COINS 2021   Internet of Things IoT | Artificial Intelligence | Machine Learning | Big Data | Blockchain | Edge & Cloud Computing | Security | Embedded Systems | Circuit and Systems | WSN | 5G
S&P 2022   IEEE Symposium on Security and Privacy (Third deadline)
Spec.Issue on Social Informatics: Scopus 2021   Journal of Social and Business Informatics - Acta Informatica Pragensia
S&P 2022   IEEE Symposium on Security and Privacy (Second deadline)
CEVVE 2021   2021 International Conference on Electric Vehicle and Vehicle Engineering (CEVVE 2021)
IJCIS 2021   International Journal on Cryptography and Information Security
EI-CCVPR 2021   2021 4th International Joint Conference on Computer Vision and Pattern Recognition (CCVPR 2021)
JEDT 2021   International Journal of Electronic Design and Test
ECCSIT 2021   2021 European Conference on Computer Science and Information Technology (ECCSIT 2021)