posted by organizer: Morisset || 3626 views || tracked by 2 users: [display]

FCS 2019 : Workshop on Foundations of Computer Security 2019

FacebookTwitterLinkedInGoogle

Link: http://homepages.cs.ncl.ac.uk/charles.morisset/fcs2019/index.html
 
When Jun 24, 2019 - Jun 24, 2019
Where Hoboken, USA
Submission Deadline Apr 22, 2019
Notification Due May 6, 2019
Categories    security   computer science   formal methods
 

Call For Papers

Computer security is an established field of both theoretical and practical significance. In recent years, there has been sustained interest in the formal foundations of methods used in computer security. The aim of the FCS 2019 workshop is to provide a forum for the discussion of continued research in this area.

FCS 2019 welcomes papers on all topics related to the formal underpinnings of security and privacy, and their applications. The scope of FCS 2019 includes, but is not limited to, formal specification, analysis, and design of cryptographic protocols and their applications; formal definitions of various aspects of security such as access control mechanisms, mobile code security and denial-of-service attacks; modeling of information flow and its application to confidentiality policies, system composition, and covert channel analysis; foundations of privacy; applications of formal techniques to practical security and privacy.

We are interested in new theoretical results, in exploratory presentations that examine open questions and raise fundamental concerns about existing theories, and in the development of security/privacy tools using formal techniques. Demonstrations of tools based on formal techniques are welcome, as long as the demonstrations can be carried out on a standard digital projector (i.e., without any specialized equipment). We solicit the submission of both mature work and work in progress.

Possible topics include, but are not limited to:

Automated reasoning techniques
Composition issues
Formal specification
Foundations of verification
Information flow analysis
Language-based security
Logic-based design
Program transformation
Security models
Static analysis
Statistical methods
Tools
Trust management


for

Access control & resource usage control
Authentication
Availability and denial of service
Covert channels
Confidentiality
Integrity and privacy
Intrusion detection
Malicious code
Mobile code
Mutual distrust
Privacy
Security policies
Security protocols

Related Resources

IEEE COINS 2022   IEEE COINS 2022: Hybrid (3 days on-site | 2 days virtual)
Federated Learning in IOT Cybersecurity 2021   PeerJ Computer Science - Federated Learning for Cybersecurity in Internet of Things
S&P 2022   IEEE Symposium on Security and Privacy (Third deadline)
SECRYPT 2022   19th International Conference on Security and Cryptography
RiE 2022   13th International Conference on Robotics in Education
IEEE COINS 2022   Internet of Things IoT | Artificial Intelligence | Machine Learning | Big Data | Blockchain | Edge & Cloud Computing | Security | Embedded Systems |
Sensors 2022   Sustainable Computing based on Internet of Things Empowered with Artificial Intelligence and Blockchain
MoWiN 2022   11th International Conference on Mobile & Wireless Networks
PAKDD 2021   Pacific-Asia Conference on Knowledge Discovery and Data Mining
CEVVE 2022   2022 International Conference on Electric Vehicle and Vehicle Engineering (CEVVE 2022)