Deprecated: The each() function is deprecated. This message will be suppressed on further calls in /home/zhenxiangba/zhenxiangba.com/public_html/phproxy-improved-master/index.php on line 456 FCS09
Computer security is an established field
of computer science of both
theoretical and practical significance. In recent years, there has
been increasing interest in logic-based foundations for various
methods in computer security, including the formal specification,
analysis and design of security protocols and their applications, the
formal definition of various aspects of security such as access
control mechanisms, mobile code security and denial-of-service
attacks, and the modeling of information flow and its application to
confidentiality policies, system composition, and covert channel
analysis.
The aim of the workshop FCS'09 is to provide a forum
for continued activity in different areas of computer security,
bringing computer security researchers in closer contact with the LICS
community and giving LICS attendees an opportunity to talk to experts
in computer security, on the one hand, and contribute to bridging the
gap between logical methods and computer security foundations, on the
other.
We are interested both in new
results in theories of computer
security
and also in more exploratory presentations that examine open questions
and raise fundamental concerns about existing theories, as well as in
new results on developing and applying automated reasoning techniques
and tools for the formal specification and analysis of security
protocols. We thus solicit submissions of papers both on mature work
and on work in progress.
Possible topics include, but are not limited to:
Automated
reasoning techniques
Composition issues
Formal specification
Foundations of verification
Information flow analysis
Language-based security
Logic-based design
Program transformation
Security models
Static analysis
Statistical methods
Tools
Trust management
for
Access
control and resource
usage control
Authentication
Availability and denial of service
Covert channels
Confidentiality
Integrity and privacy
Intrusion detection
Malicious code
Mobile code
Mutual distrust
Privacy
Security policies
Security protocols
All submissions will be
peer-reviewed. Authors of accepted
papers must
guarantee that their paper will be presented at the workshop.
The
cover page should include title, names of authors, co-ordinates of
the corresponding author, an abstract, and a list of keywords.
Submissions that are clearly too long may be rejected
immediately.
Additional material intended for the referees but not for publication
in
the final version - for example details of proofs - may be placed in a
clearly marked appendix that is not included in the page limit.
Authors are invited to submit their papers electronically, as portable
document format (pdf) or postscript (ps); please, do
not send files formatted
for work processing packages
(e.g.,
Microsoft Word or Wordperfect files).
The only mechanism for paper
submissions is via