FAST 2008 is a satellite event of 13th European Symposium on Research in Computer Security FAST is under the auspices of IFIP WG 1.7 October 9-10 2008 Malaga, Spain
The fifth International Workshop on Formal Aspects in Security and Trust (FAST2008) aims at continuing the successful efforts of the previous FAST workshops, fostering the cooperation among researchers in the areas of security and trust. As computing and network infrastructures become increasingly pervasive, and as they carry increasing economic activity, society needs well matched security and trust mechanisms. These interactions increasingly span several enterprises and involve loosely structured communities of individuals. Participants in these activities must control interactions with their partners based on trust policies and business logic. Trust-based decisions effectively determine the security goals for shared information and for access to sensitive or valuable resources. FAST focuses on the formal models of security and trust that are needed to state goals and policies for these interactions. We also seek new and innovative techniques for establishing consequences of these formal models. Implementation approaches for such techniques are also welcome.
Title and abstract: 25 June 2008              
·Gilles Barthe, IMDEA Software, Spain
· Pierpaolo Degano , University of Pisa, Italy
· Alessandro Falleni, IIT-CNR, Italy
Send an e-mail to FAST2008 X iit.cnr.it (where "X" stands for "@") Latest updates about FAST 2008 will be regularly posted to security@fosad.org (a mailing list for the scientific community interested in computer security).
Suggested submission topics include, but are not limited to:
· Formal models for security, trust and reputation
We seek papers presenting original contributions. Two formats of submissions are possible: 1) short papers, up to 5 pages, 2) full papers, up to 15 pages. pages. Submissions should clearly state their category (1 or 2). Author's full name, address, and e-mail must appear in the first page.
Gerard Boudol
Secure information flow as a safety property
Alexander Lux and Heiko Mantel
Who can declassify?
Sebastian Hunt and David Clark
Noninterference for Deterministic Interactive Programs
Heiko Mantel and Henning Sudbrock
Information-Theoretic Modeling and Analysis of Interrupt-Related Covert Channels
Dominic Duggan and Ye Wu
Causality and Accountability
Dusko Pavlovic
Dynamics, robustness and fragility of trust
Emiliano Lorini, Rino Falcone and Cristiano Castelfranchi
Trust within the context of organizations: a formal approach
Fred Spiessens, Jerry den Hartog and Sandro Etalle
Know What You Trust: Analyzing and Designing Trust Policies with Scoll
Wiebren Jonge and Bart Jacobs
Privacy-friendly Electronic Traffic Pricing via Early Commits
Daniel Le Métayer
A formal privacy management framework
Jan Friso Groote and Simona Orzan
Parameterised anonymity
Francis Klay and Laurent Vigneron
Automatic Methods for Analyzing Non-Repudiation Protocols with an Active Intruder
Simone Frau, Roberto Gorrieri and Carlo Ferigato
Petri Net Security Checker: Structural Non-interference at Work
R.H.A. Verhoeven and Francien Dechesne
Verifying multi-party authentication using rank functions and PVS
James Heather and David Lundin
The append-only web bulletin board
Elsa Gunter and Ayesha Yasmeen
Secure Broadcast Ambients
Elie Bursztein
Extending Anticipation Games with Location, Penalty and Timeline
J. Aaron Pendergrass
Improving Confidence In Legacy Software By Inferring Type Parameters In Low Level Langauges
Nataliia Bielova and Fabio Massacci
Do you really mean what you actually enforced? Edit Automata Revised
Isaac Agudo, Carmen Fernández-Gago and Javier Lopez
Delegating Privileges over Finite Resources: A Quota Based Delegation Approach
Ariel Cohen, Ron van der Meyden and Lenore Zuck
Access Control and Information Flow in Transactional Memory
As for the previous editions, the post-proceedings of the workshop will be published with LNCS and a special journal issue is also planned.
The post proceedings of the Conference will be published by Springer in the
Lecture Notes in Computer Science http://www.springer.de/comp/lncs/ series. Submissions must be in English
and authors should ensure that papers are formatted according to the LNCS
format (see author's instructions given on http://www.springer.de/comp/lncs/authors.html).
TBA
Follow the instructions at this link WORKSHOP VENUE The workshop venue will be Hotel Amaragua, located in the privileged area of Beach "La Carihuela" which offers a wide gastronomic variety as well as shopping and entertainment areas in a short distance.
For more information follow this link
|