ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login

POST 2012 - The First Conference on Principles of Security and Trust

Date2012-03-25

Deadline2011-10-14

VenueTallinn, Estonia Estonia

Keywords

Websitehttp://web.cs.wpi.edu/~guttman/post12/

Topics/Call fo Papers

Principles of Security and Trust is a broad forum related to the theoretical and foundational aspects of security and trust. Papers of many kinds are welcome: new theoretical results, practical applications of existing foundational ideas, and innovative theoretical approaches stimulated by pressing practical problems.

POST combines and replaces a number of successful and longstanding workshops in this area: Automated Reasoning and Security Protocol Analysis (ARSPA), Formal Aspects of Security and Trust (FAST), Security in Concurrency (SecCo), and the Workshop on Issues in the Theory of Security (WITS). A subset of these events met jointly as an event affiliated with ETAPS in 2011 under the name Theory of Security and Applications (TOSCA).

POST is now a member conference of the European Joint Conferences on Theory and Practice of Software (ETAPS), which is the primary European forum for academic and industrial researchers working on topics relating to Software Science. ETAPS 2012 is the 15th joint conference in this series.

Call for Papers

We seek submissions proposing theories to clarify security and trust within computer science; submissions establishing new results in existing theories; and also submissions raising fundamental concerns about existing theories. We welcome new techniques and tools to automate reasoning within such theories, or to solve security and trust problems. Case studies that reflect the strengths and limitations of foundational approaches are also welcome, as are more exploratory presentations on open questions.

Areas of interest include:
Access control Anonymity Authentication
Availability Cloud security Confidentiality
Covert channels Crypto foundations Economic issues
Information flow Integrity Languages for security
Malicious code Mobile code Models and policies
Privacy Provenance Reputation and trust
Resource usage Risk assessment Security architectures
Security protocols Trust management Web service security
Productive techniques have included automated reasoning, compositionality and transformation, language-based methods, logical formalization, quantitative methods, and static analysis.

Rebuttal phase

Authors will be given a 60 hour period to read and respond to the reviews of their papers before the PC meeting. This process will not, however, provide additional iterations.

Submission Guidelines

Papers must be written in English, unpublished and not submitted for publication elsewhere. The proceedings will be published in the Springer-Verlag Lecture Notes in Computer Science series (currently pending).

Submissions must be in PDF format, formatted in the LNCS style (as specified on this page) and at most 20 pages long. The 20 pages must include references and all material intended for publication.

Additional material, that is not to be included in the final version, but may help assessing the merits of the submission - for example details of proofs - may be placed in a clearly marked appendix that is not included in the page limit. ETAPS referees are at liberty to ignore appendices, and papers must be understandable without them.

Papers are submitted via the Easychair conference management system at this page (not yet open).

A special issue of the Journal of Computer Security will be devoted to selected papers of POST 2012. Submissions will be solicited after the meeting.

Important Dates

7 October 2011: Submission deadline for abstracts (strict)
14 October 2011: Submission deadline for full papers (strict)
28 November 2011: Rebuttal phase begins
30 November 2011: Rebuttal phase ends
16 December 2011: Notification of acceptance
6 January 2012: Camera-ready versions due
The submission deadline for papers is strict (site will close at 23:59 GMT-11). Submission of an abstract implies no obligation to submit a full version; abstracts with no corresponding full versions by the full paper deadline will be considered as withdrawn.

Invited Speaker

Cynthia Dwork, Microsoft Research

Programme Committee

Co Chairs: Pierpaolo Degano, Università di Pisa (Italy)
Joshua Guttman, Worcester Polytechnic Institute (USA)
Michael Backes, Saarland and MPI-SWS, DE
Anindya Banerjee, IMDEA Software Institute, ES
Gilles Barthe, IMDEA Software Institute, ES
David Basin, ETH Zurich, CH
Veronique Cortier, CNRS, Loria, FR
Pierpaolo Degano, Università di Pisa, IT
Andrew Gordon, Microsoft Research and University of Edinburgh, UK
Joshua Guttman, WPI, USA
Ralf Küsters, Universität Trier, DE
Steve Kremer, INRIA, ENS Cachan, FR
Peeter Laud, Cybernetica AS and University of Tartu, EE
Gavin Lowe, Oxford University, UK
Heiko Mantel, Technische Universität Darmstadt, DE
Sjouke Mauw, Université du Luxembourg, LU
Catherine Meadows, NRL, USA
John C Mitchell, Stanford, USA
Sebastian Mödersheim, DTU, DK
Carroll Morgan, University of New South Wales, AU
Mogens Nielsen, University of Aarhus, DK
Catuscia Palamidessi, INRIA, École Polytechnique, FR
Andrei Sabelfeld, Chalmers, SE
Nikhil Swamy, MSR, USA
Luca Viganò, Università di Verona, IT

Steering Committee

Chair: Gilles Barthe, ES

Martin Abadi
Microsoft Research,
UC Santa Cruz,
and Collège de France Gilles Barthe
IMDEA Software Institute David Basin
ETH Zurich Pierpaolo Degano
Università di Pisa
Theo Dimitrakos
BT Riccardo Focardi
Università di Venezia Joshua Guttman
WPI Steve Kremer
INRIA, ENS Cachan
Fabio Martinelli
CNR Catherine Meadows
NRL John Mitchell
Stanford University Mogens Nielsen
University of Aarhus
Catuscia Palamidessi
INRIA, École Polytechnique Peter Ryan
Université du Luxembourg Steve Schneider
University of Surrey Luca Viganò
Università di Verona

Last modified: 2011-07-26 17:47:35