POST 2017 - 6th International Conference on Principles of Security and Trust (POST)
Topics/Call fo Papers
Principles of Security and Trust is a broad forum related to the theoretical and foundational aspects of security and trust. Papers of many kinds are welcome: new theoretical results, practical applications of existing foundational ideas, and innovative theoretical approaches stimulated by pressing practical problems.
POST was created in 2012 to combine and replace a number of successful and longstanding workshops in this area: Automated Reasoning and Security Protocol Analysis (ARSPA), Formal Aspects of Security and Trust (FAST), Security in Concurrency (SecCo), and the Workshop on Issues in the Theory of Security (WITS). A subset of these events met jointly as an event affiliated with ETAPS 2011 under the name Theory of Security and Applications (TOSCA).
We seek submissions proposing theories to clarify security and trust within computer science; submissions establishing new results in existing theories; and also submissions raising fundamental concerns about existing theories. We welcome new techniques and tools to automate reasoning within such theories, or to solve security and trust problems. Case studies that reflect the strengths and limitations of foundational approaches are also welcome, as are more exploratory presentations on open questions.
Areas of interest include:
Access control Anonymity Authentication
Availability Cloud security Confidentiality
Covert channels Crypto foundations Economic issues
Information flow Integrity Languages for security
Malicious code Mobile code Models and policies
Privacy Provenance Reputation and trust
Resource usage Risk assessment Security architectures
Security protocols Trust management Web service security
POST was created in 2012 to combine and replace a number of successful and longstanding workshops in this area: Automated Reasoning and Security Protocol Analysis (ARSPA), Formal Aspects of Security and Trust (FAST), Security in Concurrency (SecCo), and the Workshop on Issues in the Theory of Security (WITS). A subset of these events met jointly as an event affiliated with ETAPS 2011 under the name Theory of Security and Applications (TOSCA).
We seek submissions proposing theories to clarify security and trust within computer science; submissions establishing new results in existing theories; and also submissions raising fundamental concerns about existing theories. We welcome new techniques and tools to automate reasoning within such theories, or to solve security and trust problems. Case studies that reflect the strengths and limitations of foundational approaches are also welcome, as are more exploratory presentations on open questions.
Areas of interest include:
Access control Anonymity Authentication
Availability Cloud security Confidentiality
Covert channels Crypto foundations Economic issues
Information flow Integrity Languages for security
Malicious code Mobile code Models and policies
Privacy Provenance Reputation and trust
Resource usage Risk assessment Security architectures
Security protocols Trust management Web service security
Other CFPs
- 23rd International Conference on Tools and Algorithms for the Construction and Analysis of Systems (TACAS)
- 2017 European Joint Conferences on Theory and Practice of software
- Third RDA Workshop on Curricula and Teaching Methods in Cloud Computing, Big Data, and Data Science
- Second International Workshop on Quality of Service Assurance in the Cloud (QAC 2016)
- Second International Workshop on Cloud Security and Data Privacy by Design (CloudSPD’16)
Last modified: 2016-08-15 23:57:18