FAST 2008 is a satellite event of 13th European Symposium on Research in Computer Security

FAST is under the auspices of IFIP WG 1.7

October 9-10 2008 Malaga, Spain

 

OVERVIEW

The fifth International Workshop on Formal Aspects in Security and Trust (FAST2008) aims at continuing the successful efforts of the previous FAST workshops, fostering the cooperation among researchers in the areas of security and trust. As computing and network infrastructures become increasingly pervasive, and as they carry increasing economic activity, society needs well matched security and trust mechanisms. These interactions increasingly span several enterprises and involve loosely structured communities of individuals. Participants in these activities must control interactions with their partners based on trust policies and business logic. Trust-based decisions effectively determine the security goals for shared information and for access to sensitive or valuable resources. FAST focuses on the formal models of security and trust that are needed to state goals and policies for these interactions. We also seek new and innovative techniques for establishing consequences of these formal models. Implementation approaches for such techniques are also welcome.

 

IMPORTANT DATES

Title and abstract: 25 June 2008               NEW DEADLINE
Full submission: 07 July 2008 (Strict)         NEW DEADLINE
Author Notification: 4 August 2008
Pre-proceedings version: 10 September 2008
Workshop: 9-10 October 2008
Post-proceedings version: 30 October 2008

 

PROGRAMME COMMITTE

·Gilles Barthe, IMDEA Software, Spain
·Fre'de'ric Cuppens, ENST Bretagne, France
·Theo Dimitrakos, BT, UK
·Roberto Gorrieri, University of Bologna, Italy
·Masami Hagiya, University of Tokyo, Japan
·Chris Hankin, Imperial College (London), UK
·Christian Jensen, DTU, Denmark
·Audun Josang, DSTC, Australia
·Yuecel Karabulut, SAP Research, USA
·Igor Kotenko, SPIIRAS, Russia
·Ninghui Li, Purdue University, USA
·Javier Lopez, University of Malaga, Spain
·Steve Marsh, NRC, Canada
·Catherine Meadows, Naval Research Lab, USA
·Ron van der Meyden, University of New South Wales
·Mogens Nielsen, University of Aarhus, Denmark
·Flemming Nielson, Danish Technical University, Denmark
·Indrajit Ray, Colorado State University, USA
·Peter Ryan, University of Newcastle, UK
·Steve Schneider, University of Surrey, UK
·Jean-Marc Seigneur, University of Geneva
·Vitaly Smatikov, University of Texas at Austin, USA
·Ketil Stolen, SINTEF, Norway
·William H. Winsborough, University of Texas at San Antonio, USA

 

ORGANIZERS

· Pierpaolo Degano , University of Pisa, Italy
· Joshua Guttman , MITRE, USA
· Fabio Martinelli , IIT-CNR, Italy

 

LOCAL ORGANIZATION

· Alessandro Falleni, IIT-CNR, Italy

 

CONTACTS

Send an e-mail to FAST2008 X iit.cnr.it (where "X" stands for "@")

Latest updates about FAST 2008 will be regularly posted to security@fosad.org (a mailing list for the scientific community interested in computer security).

 

PAPER SUBMISSION

Suggested submission topics include, but are not limited to:

· Formal models for security, trust and reputation
· Security protocol design and analysis
· Logics for security and trust
· Trust-based reasoning
· Distributed Trust Management Systems
· Digital Assets Protection
· Data protection
· Privacy and ID management issues
· Information flow analysis
· Language-based security
· Security and Trust aspects in ubiquitous computing
· Validation/Analysis tools and techniques
· Web/Grid Services Security/Trust/Privacy
· Security and Risk Assessment
· Resource and Access Control
· Case studies

 

SUBMISSION GUIDELINES

We seek papers presenting original contributions. Two formats of submissions are possible:  

1) short papers, up to 5 pages, 

2) full papers, up to 15 pages. pages.

Submissions should clearly state their category (1 or 2). Author's full name, address, and e-mail must appear in the first page.
Accepted full papers will be published in the formal post-proceedings. Short papers as well as full papers will be published in the informal proceedings distributed at the workshop. After the workshop, authors of short papers which are judged mature enough for publication will be invited to submit full papers. These will be reviewed according to the usual refereeing procedures, and accepted papers will be published in the post-proceedings (together with the accepted full papers).
Simultaneous submission of full papers to a journal or conference/workshop with formal proceedings justifies rejection. Short papers at FAST are not formally published, so this restriction does not apply to them. However, related publications and overlapping submissions must be cited explicitly in short papers.

Follow this link to submit your paper through Easychair system

 

ACCEPTED PAPERS   NEW

Gerard Boudol

Secure information flow as a safety property

Alexander Lux and Heiko Mantel

Who can declassify?

Sebastian Hunt and David Clark

Noninterference for Deterministic Interactive Programs

Heiko Mantel and Henning Sudbrock

Information-Theoretic Modeling and Analysis of Interrupt-Related Covert Channels

Dominic Duggan and Ye Wu

Causality and Accountability

Dusko Pavlovic

Dynamics, robustness and fragility of trust

Emiliano Lorini, Rino Falcone and Cristiano Castelfranchi

Trust within the context of organizations: a formal approach

Fred Spiessens, Jerry den Hartog and Sandro Etalle

Know What You Trust: Analyzing and Designing Trust Policies with Scoll

Wiebren Jonge and Bart Jacobs

Privacy-friendly Electronic Traffic Pricing via Early Commits

Daniel Le Métayer

A formal privacy management framework

Jan Friso Groote and Simona Orzan

Parameterised anonymity

Francis Klay and Laurent Vigneron

Automatic Methods for Analyzing Non-Repudiation Protocols with an Active Intruder

Simone Frau, Roberto Gorrieri and Carlo Ferigato

Petri Net Security Checker: Structural Non-interference at Work

R.H.A. Verhoeven and Francien Dechesne

Verifying multi-party authentication using rank functions and PVS

James Heather and David Lundin

The append-only web bulletin board

Elsa Gunter and Ayesha Yasmeen

Secure Broadcast Ambients

Elie Bursztein

Extending Anticipation Games with Location, Penalty and Timeline

J. Aaron Pendergrass

Improving Confidence In Legacy Software By Inferring Type Parameters In Low Level Langauges

Nataliia Bielova and Fabio Massacci

Do you really mean what you actually enforced? Edit Automata Revised

Isaac Agudo, Carmen Fernández-Gago and Javier Lopez

Delegating Privileges over Finite Resources: A Quota Based Delegation Approach

Ariel Cohen, Ron van der Meyden and Lenore Zuck

Access Control and Information Flow in Transactional Memory

 

PROCEEDINGS

As for the previous editions, the post-proceedings of the workshop will be published with LNCS and a special journal issue is also planned. 

The post proceedings of the Conference will be published by Springer in the Lecture Notes in Computer Science http://www.springer.de/comp/lncs/ series. Submissions must be in English and authors should ensure that papers are formatted according to the LNCS format (see author's instructions given on http://www.springer.de/comp/lncs/authors.html).

 

PROGRAMME

October 9th 2008

09:30 - 10:30 Invited talk Gilles Barthe, IMDEA

10:30 - 11:00 Coffee Break

11:00 - 13:30 Information Flow

Gerard Boudol Secure information flow as a safety property

Alexander Lux and Heiko Mantel. Who can declassify?

Sebastian Hunt and David Clark. Noninterference for Deterministic Interactive Programs

Heiko Mantel and Henning Sudbrock. Information-Theoretic Modeling and Analysis of Interrupt-Related Covert Channels

Dominic Duggan and Ye Wu. Causality and Accountability

13:30 - 14:30 Lunch Break

14:30 - 16:00 Trust

Emiliano Lorini, Rino Falcone and Cristiano Castelfranchi. Trust within the context of organizations: a formal approach

Dusko Pavlovic. Dynamics, robustness and fragility of trust

Fred Spiessens, Jerry den Hartog and Sandro Etalle. Know What You Trust: Analyzing and Designing Trust Policies with Scoll

16:00 - 16:30 Coffee Break

16:30 - 18:00 Privacy

Wiebren Jonge and Bart Jacobs. Privacy-friendly Electronic Traffic Pricing via Early Commits

Daniel Le Métayer. A formal privacy management framework

Jan Friso Groote and Simona Orzan. Parameterised anonymity

October 10th 2008

09:00 - 10:30 Verification

Francis Klay and Laurent Vigneron. Automatic Methods for Analyzing Non-Repudiation Protocols with an Active Intruder

Simone Frau, Roberto Gorrieri and Carlo Ferigato. Petri Net Security Checker: Structural Non-interference at Work

R.H.A. Verhoeven and Francien Dechesne. Verifying multi-party authentication using rank functions and PVS

10:30 - 11:00 Coffee Break

11:00 - 13:00 Security protocols, models, games and types

Elie Bursztein. Extending Anticipation Games with Location, Penalty and Timeline

James Heather and David Lundin. The append-only web bulletin board

Elsa Gunter and Ayesha Yasmeen. Secure Broadcast Ambients

J. Aaron Pendergrass. Improving Confidence In Legacy Software By Inferring Type Parameters In Low Level Langauges

13:30 - 14:30 Lunch Break

14:30 - 16:00 Access control and enforcement mechanisms

Nataliia Bielova and Fabio Massacci. Do you really mean what you actually enforced? Edit Automata Revised

Isaac Agudo, Carmen Fernández-Gago and Javier Lopez. Delegating Privileges over Finite Resources: A Quota Based Delegation Approach

Ariel Cohen, Ron van der Meyden and Lenore Zuck. Access Control and Information Flow in Transactional Memory

 

GRANTS

TBA

 

REGISTRATION AND ACCOMODATION

Follow the instructions at this link

 

WORKSHOP VENUE

The workshop venue will be Hotel Amaragua, located in the privileged area of Beach "La Carihuela" which offers a wide gastronomic variety as well as shopping and entertainment areas in a short distance. For more information follow this link

 

SPONSORS