Call
for papers (
txt
version)
|
Important
dates |
Submission
|
Publication
|
PC
members
Formal foundations for computer
security have emerged in recent years, including the formal
specification and analysis of security protocols, programming
languages, access control systems, and their applications. A particular
aspect of security is personal privacy, which may be threatened
whenever users interact with services and devices which are not
directly under their control. From a user's point of view, privacy is
often seen as a part of security; but from a service provider's point
of view, privacy and security are often opposites that have to be
balanced with each other.
FCS-PrivMod aims to bring together international reserachers from
industry and academia in formal methods, computer security, and
privcay, to
develop advances and new perspectives in security and privacy models
and analysis. It comprises the FCS workshop (Foundations of Computer
Security), a satellite of LICS since 2002, and PrivMod (Privacy: Models
& Analysis), a new workshop specifically about privacy-supporting
protocols and systems.
We are interested both in new results in theories of computer security
and privacy and also in more exploratory presentations that examine
open questions and raise fundamental concerns about existing theories,
as well as in new results on developing and applying automated
reasoning techniques and tools for the formal specification and
analysis of security protocols. We thus solicit submissions of papers
both on mature work and on work in progress. Because FCS-PrivMod is not
published in archival form, we also welcome papers that overlap
with papers recently or simultaneously submitted for publication. In
such cases, overlaps should be clearly cited and the potential to
generate interesting discussion at the workshop will be a factor in the
selection process.
Topics of interest include, but are not limited to:
Automated reasoning
Decidability & complexity
Formal methods
Foundations of verification
Information flow analysis
Language-based security
Linkability & traceability
Logic-based design
Program transformation
Security models
Static analysis
Statistical methods
Tools
Trust management
Verification |
for |
Anonymity
& pseudonymity
Access
control and resource usage control
Authentication
Availability and denial of service
Cloud computing
Communication
Confidentiality
Electronic voting
Health care
Integrity and privacy
Intrusion detection
Mobile computing
Mutual distrust
Privacy
RFID
Social networks
Security policies
Security protocols |
All
submissions will be
peer-reviewed. Authors of accepted
papers must
guarantee that their paper will be presented at the workshop.
Submissions
should be at most 15
pages (a4 paper, 11pt), including
references
in the Springer LNCS style available at the URL
http://www.springer.de/comp/lncs/authors.html
The
cover page should include title, names of authors, co-ordinates of
the corresponding author, an abstract, and a list of keywords.
Submissions that are clearly too long may be rejected
immediately.
Additional material intended for the referees but not for publication
in
the final version - for example details of proofs - may be placed in a
clearly marked appendix that is not included in the page limit.
Authors are invited to submit their papers electronically, as portable
document format (pdf) or postscript (ps); please,
do
not send files formatted
for word processing packages
(e.g.,
Microsoft Word or Wordperfect files).
The only mechanism for paper
submissions will be through the
dedicated
easychair submission web page.
| Papers due: |
March 23, 2010 |
| Notification of
acceptance: |
April 25, 2010 |
| Final papers: |
May 20, 2010 |
Informal
proceedings will be made
available in electronic format and
they will be distributed to all participants of the workshop.
Participation
to the workshop will be
open to anybody willing to
register.
Chairs
- Véronique Cortier
(LORIA
INRIA-Lorraine, France)
- Mark Ryan (University of
Birmingham, UK)
- Vitaly Shmatikov (University
of Texas at Austin, USA)
Program
Committee
- Myrto Arapinis (University of Birmingham, UK)
- Kostas
Chatzikokolakis (University of Eindhoven, Netherlands)
- Liqun Chen (HP Labs Bristol,
UK)
- Stephen Chong (Harvard University, USA)
- Tom Chothia (University of Birmingham, UK)
- George Danezis (Microsoft
Cambridge, UK)
- Stéphanie Delaune
(CNRS - ENS de Cachan, France)
- Deepak Garg (Carnegie Mellon
University, USA)
- Hans Hüttel
(Aalborg University, Denmark)
- Steven Murdoch (University of Cambridge, UK)
- Catuscia Palamidessi (INRIA and Ecole Polytechnique,
France)
- Pierangela Samarati (Università degli Studi di Milano,
Italy)
- Ben Smyth (University of Birmingham, UK & ENS Paris, France)
- Paul Syverson (Naval
Research Laboratory, USA)
- Gene Tsudik (University of
California, Irvine, USA)
- Luca Vigano (University of Verona, Italy)
Last
modified on December 8th,
2009.