posted by user: rcardoso || 7119 views || tracked by 5 users: [display]

FAST 2010 : 7th International Workshop on Formal Aspects of Security and Trust

FacebookTwitterLinkedInGoogle


Conference Series : Formal Aspects in Security and Trust
 
Link: http://www.iit.cnr.it/FAST2010
 
When Sep 16, 2010 - Sep 17, 2010
Where Pisa, Italia
Abstract Registration Due Jun 13, 2010
Submission Deadline Jun 20, 2010
Notification Due Jul 19, 2010
Categories    security   trust
 

Call For Papers

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
7th International Workshop on
Formal Aspects of Security & Trust
(FAST2010)
16-17 September 2010
Pisa, Italia
http://www.iit.cnr.it/FAST2010/

FAST2010 is co-located with the
8th IEEE International Conference on
SOFTWARE ENGINEERING AND FORMAL METHODS (SEFM)
http://www.sefm2010.isti.cnr.it
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~


OVERVIEW OF FAST

The seventh International Workshop on Formal Aspects of Security
and Trust (FAST2010) aims at continuing the successful efforts
of the previous FAST workshops, fostering cooperation among
researchers in the areas of security and trust.

Computing and network infrastructures have become pervasive, and
now they carry a great deal of economic activity. Thus, society
needs well matching security and trust mechanisms. Interactions
increasingly span several enterprises and involve loosely
structured communities of individuals. Participants in these
activities must control interactions with their partners based
on trust policies and business logic. Trust-based decisions
effectively determine the security goals for shared information
and for access to sensitive or valuable resources.

FAST focuses on the formal models of security and trust that are
needed to state goals and policies for these interactions. We also
seek new and innovative techniques for establishing consequences of
these formal models. Implementation approaches for such techniques
are also welcome.


PAPER SUBMISSION
Suggested submission topics include, but are not limited to:

Formal models for security, trust and reputation
Security protocol design and analysis
Logics for security and trust
Trust-based reasoning
Distributed trust management systems
Digital asset protection
Data protection
Privacy and ID management issues
Information flow analysis
Language-based security
Security and trust aspects in ubiquitous computing
Validation/Analysis tools
Web/Grid services security/trust/privacy
Security and risk assessment
Resource and access control
Case studies

IMPORTANT DATES
Title/Abstract Submission: 13 June
Paper submission: 20 June (STRICT!)

Author Notification: 19 July
Pre-proceedings version: 1 September
Workshop: 16-17 September
Post-proceedings version: 1 November


Organizers
- Pierpaolo Degano, Universita` di Pisa, Italy
- Sandro Etalle, Tech. Univ. Eindhoven, The Netherlands
- Joshua Guttman, Worcester Polytechnic Inst., USA


Program Committee (tentative)

Gilles Barthe, IMDEA Software, Spain
Massimo Bartoletti, University of Cagliari, Italy
Lujo Bauer, CMU, USA
Cas Cremers, ETH Zurich
Frederic Cuppens, Telecom Bretagne, France
Pierpaolo Degano, University of Pisa, Italy (co-chair)
Sandro Etalle, TU Eindhoven, The Netherlands (co-chair)
Joshua Guttman, Worcester Polytechnic Inst., USA (co-chair)
Chris Hankin, Imperial College (London), UK
Bart Jacobs, Radboud Univ. Nijmegen, The Netherlands
Christian Jensen, DTU, Denmark
Fabio Martinelli, CNR, IT
Sjouwke Mauw, University of Luxemburg, Luxembourg
Catherine Meadows, Naval Research Lab, USA
Ron van der Meyden, University of New South Wales, Australia
Mogens Nielsen, Aarhus, Denmark
Dusko Pavlovic, Kestrel Institute, USA and Oxford, UK
Riccardo Pucella, Northeastern, USA
Peter Ryan, University of Luxembourg, Luxembourg
Steve Schneider, Surrey, UK (to be confirmed)
Jean-Marc Seigneur, University of Geneva, Switzerland
Luca Vigano', Universita` di Verona, Italy


Local Organizer

Ilaria Matteucci, IIT-CNR, Pisa

For additional information visit http://www.iit.cnr.it/FAST2010/
or e_mail to fast2010@iit.cnr.it


PROCEEDINGS

As done for the previous issues of FAST, the post-proceedings of the
workshop will be published with LNCS (under negotiation).
A special journal issue is also planned.


SUBMISSION GUIDELINES:

We seek papers presenting original contributions. Two types of
submissions are possible:

(1) short papers, up to 5 pages in LNCS format,
(2) full papers, up to 15 pages in LNCS format.

Submissions should clearly state their category (1 or 2).
Author's full name, address, and e-mail must appear on the first page.

Short papers as well as full papers will be included in the
informal proceedings distributed at the workshop. After the
workshop, authors of short papers which are judged mature enough
for publication will be invited to submit full papers. These
will be reviewed according to the usual refereeing procedures,
and accepted papers will be published in the post-proceedings in
LNCS.

Simultaneous submission of full papers to a journal or
conference/workshop with formal proceedings justifies rejection.
Short papers at FAST are not formally published, so this
restriction does not apply to them. However, related
publications and overlapping submissions must be cited
explicitly in short papers.

Related Resources

Security 2025   Special Issue on Recent Advances in Security, Privacy, and Trust
TASE 2025   19th International Symposium on Theoretical Aspects of Software Engineering
MSEJ 2024   Advances in Materials Science and Engineering: An International Journal
TASE 2025   19th International Symposium on Theoretical Aspects of Software Engineering
ICISSP 2025   11th International Conference on Information Systems Security and Privacy
LAMAS&SR 2024   International Workshop on Logical Aspects in Multi-Agent Systems and Strategic Reasoning
ACNS 2025   23rd International Conference on Applied Cryptography and Network Security - deadline 2
FACS 2024   20th International Conference on Formal Aspects of Component Software
FAST 2025   File and Storage Technologies
ASIACCS 2025   The 20th ACM ASIA Conference on Computer and Communications Security - deadline 2