posted by user: ka_ti_bo || 3163 views || tracked by 8 users: [display]

FCS-PrivMod 2010 : Workshop on Foundations of Security and Privacy


When Jul 14, 2010 - Jul 15, 2010
Where Edinburgh, UK
Submission Deadline Mar 23, 2010
Notification Due Apr 25, 2010
Final Version Due May 20, 2010
Categories    security   privacy   models

Call For Papers

! !
! FCS-PrivMod 2010 !
! Edinburgh, UK !
! July 14-15, 2010 !
! !
! !
! Affiliated with FLoC 2010 !
! !

Papers due: March 23, 2010
Notification: April 25, 2010

Formal foundations for computer security have emerged in recent
years, including the formal specification and analysis of security
protocols, programming languages, access control systems, and their
applications. A particular aspect of security is personal
privacy, which may be threatened whenever users interact with services
and devices which are not directly under their control. From a user's
point of view, privacy is often seen as a part of security; but from a
service provider's point of view, privacy and security are often
opposites that have to be balanced with each other.

FCS-PrivMod aims to bring together international researchers
from industry and academia in formal methods, computer security,
and privacy, to develop advances and new perspectives in security and
privacy models and analysis. It comprises the FCS workshop
(Foundations of Computer Security), a satellite of LICS since 2002,
and PrivMod (Privacy: Models & Analysis), a new workshop specifically
about privacy-supporting protocols and systems.

We are interested both in new results in theories of computer security
and privacy and also in more exploratory presentations that examine
open questions and raise fundamental concerns about existing theories,
as well as in new results on developing and applying automated
reasoning techniques and tools for the formal specification and
analysis of security protocols. We thus solicit submissions of papers
both on mature work and on work in progress. Because FCS-PrivMod is
not published in archival form, we also welcome papers that overlap
with papers recently or simultaneously submitted for publication. In
such cases, overlaps should be clearly cited and the potential to
generate interesting discussion at the workshop will be a factor in
the selection process.

Topics of interest include, but are not limited to:

Automated reasoning
Decidability & complexity
Formal methods
Foundations of verification
Information flow analysis
Language-based security
Linkability & traceability
Logic-based design
Program transformation
Security models
Static analysis
Statistical methods
Trust management


Anonymity & pseudonymity
Access control and resource usage control
Availability and denial of service
Cloud computing
Electronic voting
Health care
Integrity and privacy
Intrusion detection
Mobile computing
Mutual distrust
Social networks
Security policies
Security protocols

All submissions will be peer-reviewed. Authors of accepted papers must
guarantee that their paper will be presented at the workshop.

Submissions should be at most 15 pages (a4 paper, 11pt), including
references in the Springer LNCS style available at the URL

The cover page should include title, names of authors, coordinates of
the corresponding author, an abstract, and a list of
keywords. Submissions that are clearly too long may be rejected
immediately. Additional material intended for the referees but not for
publication in the final version - for example details of proofs - may
be placed in a clearly marked appendix that is not included in the
page limit.

Authors are invited to submit their papers electronically, as portable
document format (pdf) or postscript (ps); please, do not send files
formatted for word processing packages (e.g., Microsoft Word or
Wordperfect files). The only mechanism for paper submissions will be
through the dedicated easychair submission web page.

Informal proceedings will be made available in electronic format and
they will be distributed to all participants of the workshop.

* Myrto Arapinis (University of Birmingham, UK)
* Kostas Chatzikokolakis (University of Eindhoven, Netherlands)
* Liqun Chen (HP Labs Bristol, UK)
* Stephen Chong (Harvard University, USA)
* Tom Chothia (University of Birmingham, UK)
* Veronique Cortier (LORIA INRIA-Lorraine, France; co-chair)
* George Danezis (Microsoft Cambridge, UK)
* Stephanie Delaune (CNRS - ENS de Cachan, France)
* Deepak Garg (Carnegie Mellon University, USA)
* Hans Hüttel (Aalborg University, Denmark)
* Steven Murdoch (University of Cambridge, UK)
* Catuscia Palamidessi (INRIA and Ecole Polytechnique, France)
* Mark Ryan (University of Birmingham, UK; co-chair)
* Pierangela Samarati (Universita` degli Studi di Milano, Italy)
* Vitaly Shmatikov (University of Texas at Austin, USA; co-chair)
* Ben Smyth (University of Birmingham, UK & ENS Paris, France)
* Paul Syverson (Naval Research Laboratory, USA)
* Gene Tsudik (University of California, Irvine, USA)
* Luca Vigano (University of Verona, Italy)

Related Resources

AsiaCCS 2021   The 16th ACM ASIA Conference on Computer and Communications Security [First Round]
AVC 2020   Advances in Vision Computing: An International Journal
JISA-CYBER-SEC 2020   Special Issue on Trends in Cybersecurity, Journal of Information Security and Applications, Elsevier
SPIoT 2020   9th International Symposium on Security and Privacy on the Internet of Things
IWCSP 2021   2021 International Workshop on Cryptography, Security and Privacy (IWCSP 2021)
JSE 2020   9th International Conference on Software Engineering and Applications
Symmetry-SI 2020   Special issue on Symmetry and Asymmetry in IoT and CPS Security and Privacy
CSW 2021   2021 International Workshop on Cyber Security (CSW 2021)
Sensors (MDPI) 2020   Special Issue on Security, Trust and Privacy in New Computing Environments
CSPPSG 2021   MDPI Sensors - Special Issue on 'Cybersecurity and Privacy-Preserving in Modern Smart Grid'