FCS'11

Workshop on Foundations of Computer Security


WORKSHOP CANCELLED

Affiliated with LICS'11.


Call for papers | Important dates | Submission | Publication | PC members | Previous editions


Background, aim and scope

Computer security is an established field of computer science of both theoretical and practical significance. In recent years, there has been increasing interest in logic-based foundations for various methods in computer security, including the formal specification, analysis and design of security protocols and their applications, the formal definition of various aspects of security such as access control mechanisms, mobile code security and denial-of-service attacks, and the modeling of information flow and its application to confidentiality policies, system composition, and covert channel analysis.

The aim of the workshop FCS'11 is to provide a forum for continued activity in different areas of computer security, bringing computer security researchers in closer contact with the LICS community and giving LICS attendees an opportunity to talk to experts in computer security, on the one hand, and contribute to bridging the gap between logical methods and computer security foundations, on the other.

We are interested both in new results in theories of computer security and also in more exploratory presentations that examine open questions and raise fundamental concerns about existing theories, as well as in new results on developing and applying automated reasoning techniques and tools for the formal specification and analysis of security protocols. We thus solicit submissions of papers both on mature work and on work in progress.
Possible topics include, but are not limited to: 

Automated reasoning techniques
Composition issues
Formal specification
Foundations of verification
Information flow analysis
Language-based security
Logic-based design
Program transformation
Security models
Static analysis
Statistical methods
Tools
Trust management
for Access control and resource usage control
Authentication
Availability and denial of service
Covert channels
Confidentiality
Integrity and privacy
Intrusion detection
Malicious code
Mobile code
Mutual distrust
Privacy
Security policies
Security protocols

All submissions will be peer-reviewed. Authors of accepted papers must guarantee that their paper will be presented at the workshop.

Submission

Submissions should be at most 15 pages (a4paper, 11pt), including references in the Springer LNCS style available at the URL http://www.springer.de/comp/lncs/authors.html

The cover page should include title, names of authors, co-ordinates of the corresponding author, an abstract, and a list of keywords. Submissions that are clearly too long may be rejected immediately. Additional material intended for the referees but not for publication in the final version - for example details of proofs - may be placed in a clearly marked appendix that is not included in the page limit.

Authors are invited to submit their papers electronically, as portable document format (pdf) or postscript (ps); please, do not send files formatted for word processing packages (e.g., Microsoft Word or WordPerfect files). The only mechanism for paper submissions is via

the dedicated EasyChair submission web page.

Please, follow the instructions given there.

Important dates

Extended deadline: April 10, 2011
Notification of acceptance: April 29, 2011
Final papers: May 23, 2011

Publication

Informal proceedings will be made available in electronic format and they will be distributed to all participants of the workshop.

Audience

Participation to the workshop will be open to anybody willing to register.

Program Committee

Previous editions



Last modified on December 31st, 2010.