Deprecated: The each() function is deprecated. This message will be suppressed on further calls in /home/zhenxiangba/zhenxiangba.com/public_html/phproxy-improved-master/index.php on line 456 FCS'05
Computer security is an established field of Computer Science of both
theoretical and practical significance. In recent years, there has
been increasing interest in foundations for various
methods in computer security, including the formal specification,
analysis and design of cryptographic protocols and their applications,
the formal definition of various aspects of security such as access
control mechanisms, mobile code security and denial-of-service
attacks, trust management, and the modeling of information flow and
its application to confidentiality policies, system composition, and
covert channel analysis.
The aim of this workshop is to provide a forum for continued activity
in this area, to bring computer security researchers in contact with
the LICS'05
community,
and to give LICS attendees an opportunity to talk to experts
in computer security.
Topics
We are interested both in new results in theories of computer security and
also in more exploratory presentations that examine open questions and raise
fundamental concerns about existing theories. Possible topics include, but
are not limited to:
Composition issues
Formal specification
Foundations of verification
Information flow analysis
Language-based security
Logic-based design
Program transformation
Security models
Static analysis
Statistical methods
Trust management
for
Authentication
Availability and denial of service
Covert channels
Cryptographic protocols
Confidentiality
Integrity and privacy
Intrusion detection
Malicious code
Mobile code
Mutual distrust
Security policies
Submission Instructions
Authors are invited to submit an extended abstract explaining recent research
results or work in progress. Papers shall not exceed 10 pages, inclusive of
bibliography and appendices. They should be formatted for A4 or US letter
paper with reasonable margins and fonts. The first page should include the
title, the names and addresses of the authors, an abstract and a list of
keywords. Authors are strongly encouraged to use the following LaTeX template
for formatting submissions.
Click here to submit a
paper.
Accepted formats are limited to portable postscript and PDF.
Please do not send files formatted for word processing packages (e.g.,
Microsoft Word or WordPerfect files).
As traditional for FCS, the workshop has no formal proceedings. Nevertheless,
informal proceedings will be made available in electronic format and they will
be distributed to all participants of the workshop. The authors of the best
papers might be invited to submit an extended revision for inclusion in a
special issue of a journal.
Important Dates
Papers due:
March 25, 2005
Notification of acceptance:
May 2, 2005
Final papers:
May 13, 2005
Workshop:
June 30 - July 1, 2005
Invited Speakers
Frank Pfenning, Carnegie Mellon University, USA
Title: Constructive Authorization Logics
Jan Vitek, Purdue
University, USA
Title: Language-based Intrusion Detection
Information about registration, travel, and venue can be found
here.
You may
also want to consult the web page for the 2002, 2003,
and 2004
editions of FCS.
For further information contact:
Program Chair
Andrei Sabelfeld Department of Computer Science
Chalmers University of Technology and Gothenburg University
41296 Gothenburg
Sweden
Voice: +46 31 772 1000
Fax: +46 31 165655