posted by user: ka_ti_bo || 3674 views || tracked by 8 users: [display]

FCS-PrivMod 2010 : Workshop on Foundations of Security and Privacy


When Jul 14, 2010 - Jul 15, 2010
Where Edinburgh, UK
Submission Deadline Mar 23, 2010
Notification Due Apr 25, 2010
Final Version Due May 20, 2010
Categories    security   privacy   models

Call For Papers

! !
! FCS-PrivMod 2010 !
! Edinburgh, UK !
! July 14-15, 2010 !
! !
! !
! Affiliated with FLoC 2010 !
! !

Papers due: March 23, 2010
Notification: April 25, 2010

Formal foundations for computer security have emerged in recent
years, including the formal specification and analysis of security
protocols, programming languages, access control systems, and their
applications. A particular aspect of security is personal
privacy, which may be threatened whenever users interact with services
and devices which are not directly under their control. From a user's
point of view, privacy is often seen as a part of security; but from a
service provider's point of view, privacy and security are often
opposites that have to be balanced with each other.

FCS-PrivMod aims to bring together international researchers
from industry and academia in formal methods, computer security,
and privacy, to develop advances and new perspectives in security and
privacy models and analysis. It comprises the FCS workshop
(Foundations of Computer Security), a satellite of LICS since 2002,
and PrivMod (Privacy: Models & Analysis), a new workshop specifically
about privacy-supporting protocols and systems.

We are interested both in new results in theories of computer security
and privacy and also in more exploratory presentations that examine
open questions and raise fundamental concerns about existing theories,
as well as in new results on developing and applying automated
reasoning techniques and tools for the formal specification and
analysis of security protocols. We thus solicit submissions of papers
both on mature work and on work in progress. Because FCS-PrivMod is
not published in archival form, we also welcome papers that overlap
with papers recently or simultaneously submitted for publication. In
such cases, overlaps should be clearly cited and the potential to
generate interesting discussion at the workshop will be a factor in
the selection process.

Topics of interest include, but are not limited to:

Automated reasoning
Decidability & complexity
Formal methods
Foundations of verification
Information flow analysis
Language-based security
Linkability & traceability
Logic-based design
Program transformation
Security models
Static analysis
Statistical methods
Trust management


Anonymity & pseudonymity
Access control and resource usage control
Availability and denial of service
Cloud computing
Electronic voting
Health care
Integrity and privacy
Intrusion detection
Mobile computing
Mutual distrust
Social networks
Security policies
Security protocols

All submissions will be peer-reviewed. Authors of accepted papers must
guarantee that their paper will be presented at the workshop.

Submissions should be at most 15 pages (a4 paper, 11pt), including
references in the Springer LNCS style available at the URL

The cover page should include title, names of authors, coordinates of
the corresponding author, an abstract, and a list of
keywords. Submissions that are clearly too long may be rejected
immediately. Additional material intended for the referees but not for
publication in the final version - for example details of proofs - may
be placed in a clearly marked appendix that is not included in the
page limit.

Authors are invited to submit their papers electronically, as portable
document format (pdf) or postscript (ps); please, do not send files
formatted for word processing packages (e.g., Microsoft Word or
Wordperfect files). The only mechanism for paper submissions will be
through the dedicated easychair submission web page.

Informal proceedings will be made available in electronic format and
they will be distributed to all participants of the workshop.

* Myrto Arapinis (University of Birmingham, UK)
* Kostas Chatzikokolakis (University of Eindhoven, Netherlands)
* Liqun Chen (HP Labs Bristol, UK)
* Stephen Chong (Harvard University, USA)
* Tom Chothia (University of Birmingham, UK)
* Veronique Cortier (LORIA INRIA-Lorraine, France; co-chair)
* George Danezis (Microsoft Cambridge, UK)
* Stephanie Delaune (CNRS - ENS de Cachan, France)
* Deepak Garg (Carnegie Mellon University, USA)
* Hans Hüttel (Aalborg University, Denmark)
* Steven Murdoch (University of Cambridge, UK)
* Catuscia Palamidessi (INRIA and Ecole Polytechnique, France)
* Mark Ryan (University of Birmingham, UK; co-chair)
* Pierangela Samarati (Universita` degli Studi di Milano, Italy)
* Vitaly Shmatikov (University of Texas at Austin, USA; co-chair)
* Ben Smyth (University of Birmingham, UK & ENS Paris, France)
* Paul Syverson (Naval Research Laboratory, USA)
* Gene Tsudik (University of California, Irvine, USA)
* Luca Vigano (University of Verona, Italy)

Related Resources

EICC 2023   European Interdisciplinary Cybersecurity Conference (EICC 2023)
SI on NT-ST&P in FCS 2023   New trends in Security, Trust, and Privacy in Future Cyber-Systems
IEEE CCNC STP-CPS 2023   5th International Workshop on Security Trust Privacy for Cyber-Physical Systems (STP-CPS'23) with IEEE CCNC 2023, 8-11 January, Las Vegas, NV, USA
SI on ATD&IS II 2023   Special Issue on Advanced Technologies in Data and Information Security II, Applied Sciences, MDPI
EvoCompAISecurity&Privacy 2022   Evolutionary Computing for AI-Driven Security and Privacy: Advancing the state-of-the-art applications
IEEE ICISPP 2023   IEEE--2023 4th International Conference on Information Security and Privacy Protection (ICISPP 2023)
ITCA 2023   11th International Conference of Information Technology, Control and Automation
BIOSIG 2023   International Conference of the Biometrics Special Interest Group
NeTCoM 2023   15th International Conference on Networks & Communications
doors 2023   3rd Edge Computing Workshop