|
|
|
FAST 2006 is affiliated 14th Formal Methods Symposium (FM’06)
and sponsored by IFIP WG 1.7 "Theoretical Foundations of Security
Analysis and Design"
August 26-27 2006, Hamilton, Ontario, Canada
|
List of accepted papers
is available! |
OVERVIEW
The fourth international Workshop on Formal Aspects in
Security and Trust (FAST2006) aims at continuing the successful effort of
the first three FAST workshops for fostering the cooperation among researchers in the
areas of security and trust. The new challenges offered by the so-called
ambient intelligence space as a future paradigm in the information
society demand for a coherent framework of concepts, tools and methodologies
to enable user's trust&confidence on the underlying
computing
infrastructure. These need to address issues relating to both guaranteeing
security of the infrastructure and the perception of the infrastructure
being secure. In addition, user confidence on what is happening must
be enhanced by developing trust models effective but also easily comprehensible
and manageable by users.
The
complexity and scale of deployment of emerging ICT systems based on
web service and grid computing concepts also necessitates the investigation
of new, scalable and more flexible foundational models of enforcing
pervasive security across organizational borders and in situations
where there is high uncertainty about the identity and
trustworthyness
of the participating networked entities (including users, services
and resources). The increasing need of building activities sharing
different resources managed with different policies demands for new
and business enabling models of trust between members of virtual communities
including virtual organizations that span across the boundaries of
physical enterprises and loosely structured communities of individuals.
IMPORTANT
DATES
Papers submission: 05 July 2006 (EXTENDED!!)
Author Notification: 29 July 2006
Pre-proceedings version: 10 August2006
Workshop: 26-27 August 2006
Post-proceedings version: 30 September 2006
PROGRAMME
COMMITTE
·Gilles Barthe, INRIA Sophia-Antipolis, France
·Stefano Bistarelli, University of Pescara, Italy
·Gregor v. Bochmann, University of Ottawa, Canada
·John A Clark, University of york, UK
·Fre'de'ric Cuppens, ENST Bretagne, France
·Roberto Gorrieri, University of Bologna, Italy
·Joshua D. Guttman, MITRE, USA
·Masami Hagiya, University of Tokyo, Japan
·Chris Hankin, Imperial College (London), UK
·Christian Jensen, DTU, Denmark
·Audun Josang, DSTC, Australia
·Jan Jürjens, TU München, Germany
·Yuecel karabulut, SAP, Germany
·Igor Kotenko, SPIIRAS, Russia
·Heiko Krumm, University of Dortmund, Germany
·Ninghui Li, Purdue University, USA
·Steve Marsh, Institute for Information Technology, NRC, Canada
·Catherine Meadows, Naval Research Lab, USA
·Ron van der Meyden, University of New South Wales, Australia
·Mogens Nielsen, University of Aarhus, Denmark
·Flemming Nielson, Danish Technical University, Denmark
·Indrajit Ray, Colorado State University, USA
·Babak Sadighi Firozabadi, SICS, Sweden,
·Pierangela Samarati, University of Milan, Italy
·Jean-Marc Seigneur, University of Geneva, Switzerland
·Ketil Stolen, SINTEF, Norway
·Paul Syverson, Naval Research Laboratory, USA
·William H. Winsborough, University of Texas at San Antonio, USA
INVITED SPEAKERS
·Joshua D. Guttman, MITRE, USA
ORGANIZERS
· Theo Dimitrakos, BT
· Fabio Martinelli, IIT-CNR
· Peter Ryan, University of Newcastle
· Steve Schneider, University of Surrey
LOCAL ORGANIZATION
· Alessandro Falleni, IIT-CNR
Contacts
Send an e-mail to FAST2006 X iit.cnr.it (where "X" stands for "@")
Latest updates about FAST 2006 will be regularly posted to
security@fosad.org (a
mailing list for the scientific community interested in computer
security).
PAPER
SUBMISSION
Topics:
Suggested
submission topics include, but are not limited to, formal aspects of:
· Models for security, trust and reputation
· Security protocol design and analysis
· Logics for security and trust
· Trust-based reasoning
· Distributed Trust Management Systems
· Digital Assets Protection
· Data protection
· Privacy and ID management issues
· Information flow analysis
· Language-based security
· Security and Trust aspects in ubiquitous computing
· Validation/Analysis tools and techniques
· Web/Grid Services Security/Trust/Privacy
· Security and Risk Assessment
· Case studies
Instructions:
Papers presenting original contributions are sought. Two formats of submissions are possible: 1) short papers, up to 5 pages, 2) full papers, up to 15
pages. Submissions should clearly state their category (1 or 2). Author's full name, address, and e-mail must appear in the cover page.
Accepted full papers will be published in the formal post-proceedings.
Short papers will be published in the informal proceedings distributed
at the workshop (together with the accepted full papers).
After the workshop, authors of short papers which are judged mature for publication
will be invited to submit full papers. These will be reviewed according to the usual refereeing
procedures, and accepted papers will be published in the post-proceedings on LNCS
(together with the accepted full papers).
Simultaneous
submission of full papers to a journal or conference/workshop with
formal proceedings is not allowed.
Follow
this
link to submit your paper through Easychair system
PROCEEDINGS
Follow this link http://www.springerlink.com/content/978-3-540-75226-4/ for LNCS Proceedings
and this one http://www.springerlink.com/content/e37nm31401676330/ for the
special journal issue on International Journal of Information Security.
PROGRAMME
The program is now available here
GRANTS
TBA
REGISTRATION
Follow the instructions at (FM’06)
page.
ACCOMMODATION
Follow this link
WORKSHOP VENUE
McMaster University
Hamilton, Ontario, Canada
For more information follow this link
SPONSORS
|
|
|
|