FAST 2005 is affiliated 13th Formal Methods Symposium (FM’05) and sponsored by IFIP WG 1.7 "Theoretical Foundations of Security Analysis and Design"
The complexity and scale of deployment of emerging ICT systems based on web service and grid computing concepts also necessitates the investigation of new, scalable and more flexible foundational models of enforcing pervasive security across organizational borders and in situations where there is high uncertainty about the identity and trustworthyness of the participating networked entities (including users, services and resources). The increasing need of building activities sharing different resources managed with different policies demands for new and business enabling models of trust between members of virtual communities including virtual organizations that span across the boundaries of physical enterprises and loosely structured communities of individuals.
Paper
Abstract Submission: 9 May 2005 (Extended!)
·Elisa Bertino, Purdue University, USA INVITED SPEAKERS
· Cédric Fournet, Microsoft Research (Cambridge)
Contacts Send an e-mail to FAST2005 X @ iit.cnr.it (where "X" stands for "@") Latest updates about FAST 2005 will be regularly posted to security@fosad.org (a mailing list for the scientific community interested in computer security). Topics: Suggested submission topics include, but are not limited to, formal aspects of: · Models for security, trust and reputation Instructions: Papers presenting original contributions are sought. Two formats of submissions are possible: 1) short papers, up to 5 pages, 2) full papers, up to 14 pages. Submissions should clearly state their category (1 or 2). Papers should be written with 11pt or larger font and reasonable margins and line
spacing. Author's full name, address, and e-mail must appear in the cover page.
Publication of the
post-proceedings of the workshop is
planned with LNCS (see the volume detalis (here) . A special issue with
a selection of the
best papers of FAST 2004 and FAST 2005 will be published on
the International Journal of Information Security (IJIS). A preliminary programme is now available ( pdf , txt )
TBA
Follow the instructions at (FM’05) page.
ACCOMMODATION Follow this link WORKSHOP VENUE Curtis Auditorium, The Herschel Building, University of Newcastle Upon Tyne.
|