| |||||||||||||
FCS 2019 : Workshop on Foundations of Computer Security 2019 | |||||||||||||
Link: http://homepages.cs.ncl.ac.uk/charles.morisset/fcs2019/index.html | |||||||||||||
| |||||||||||||
Call For Papers | |||||||||||||
Computer security is an established field of both theoretical and practical significance. In recent years, there has been sustained interest in the formal foundations of methods used in computer security. The aim of the FCS 2019 workshop is to provide a forum for the discussion of continued research in this area.
FCS 2019 welcomes papers on all topics related to the formal underpinnings of security and privacy, and their applications. The scope of FCS 2019 includes, but is not limited to, formal specification, analysis, and design of cryptographic protocols and their applications; formal definitions of various aspects of security such as access control mechanisms, mobile code security and denial-of-service attacks; modeling of information flow and its application to confidentiality policies, system composition, and covert channel analysis; foundations of privacy; applications of formal techniques to practical security and privacy. We are interested in new theoretical results, in exploratory presentations that examine open questions and raise fundamental concerns about existing theories, and in the development of security/privacy tools using formal techniques. Demonstrations of tools based on formal techniques are welcome, as long as the demonstrations can be carried out on a standard digital projector (i.e., without any specialized equipment). We solicit the submission of both mature work and work in progress. Possible topics include, but are not limited to: Automated reasoning techniques Composition issues Formal specification Foundations of verification Information flow analysis Language-based security Logic-based design Program transformation Security models Static analysis Statistical methods Tools Trust management for Access control & resource usage control Authentication Availability and denial of service Covert channels Confidentiality Integrity and privacy Intrusion detection Malicious code Mobile code Mutual distrust Privacy Security policies Security protocols |
|