5th International Workshop on
Security Issues in Concurrency
September 3rd, 2007, Lisboa (Portugal)
Affiliated to CONCUR 2007
Call for papers (PS, PDF, txt)


Emerging trends in concurrency theory require the definition of models and languages adequate for the design and management of new classes of applications, mainly to program either WANs (like Internet) or smaller networks of mobile and portable devices (which support applications based on a dynamically reconfigurable communication structure). Due to the openness of these systems, new critical aspects come into play, such as the need to deal with malicious components or with a hostile environment. Current research on network security issues (e.g. secrecy, authentication, etc.) usually focuses on opening cryptographic point-to-point tunnels. Therefore, the proposed solutions in this area are not always exploitable to support the end-to-end secure interaction between entities whose availability or location is not known beforehand.
     The aim of the workshop is to cover the gap between the security and the concurrency communities. More precisely, the workshop promotes the exchange of ideas, trying to focus on common interests and stimulating discussions on central research questions. In particular, we look for papers dealing with security issues (such as authentication, integrity, privacy, confidentiality, access control, denial of service, service availability, safety aspects, fault tolerance, trust, language-based security) in emerging fields like web services, mobile ad-hoc networks, agent-based infrastructures, peer-to-peer systems, context-aware computing, global/ubiquitous/pervasive computing.

PANEL DISCUSSION: "Information hiding: state-of-the-art and emerging trends"
The last afternoon session will host a panel that will be a venue where researchers from different areas of computer security will present common/orthogonal problems, techniques and goals related to information hiding. We shall cover aspects like data secrecy, anonymity, database security, ... approached from different points of view (language-based security, quantitative aspects, access control, ...). The panelists are:
      Sabrina De Capitani di Vimercati (Univ. Milano, I)
      Steve Kremer (INRIA and ENS Cachan, F)
      Pasquale Malacaria (Queen Mary, UK)
They will present their point of view on the topic and take questions from the audience. Active participation in the discussion by the audience will be encouraged.


Daniele Gorla (Univ. di Roma "La Sapienza", IT)
Catuscia Palamidessi (INRIA and Ecole polytechnique, F)

Michael Backes (Saarland Univ., G)
Tom Chothia (CWI, NL)
Véronique Cortier (CNRS Loria, F)
Yuxin Deng (Univ. of New South Wales, AUS)
Heiko Mantel (RWTH, G)
Mogens Nielsen (BRICS, DK)
Flemming Nielson (DTU, DK)
Mark Ryan (Univ. of Birmingham, UK)
Luca Viganò (Univ. Verona, IT)
Jan Vitek (Purdue Univ., USA)

Cédric Fournet (Microsoft Research - Cambridge, UK)

Submission of abstracts: June 4th, 2007
Submission of papers: June 7th, 2007
Notification: July 13th, 2007
Pre-Final version: July 23rd, 2007
Meeting date: September 3rd, 2007
Final version: September 28th, 2007

The workshop proceedings will be published in the ENTCS series (Electronic Notes in Theoretical Computer Science); we thus encourage submissions already in that format. Submissions may be of two kinds: short papers (not included in the proceedings; up to 5 ENTCS pages) and regular papers (up to 15 ENTCS pages, including bibliography). Papers must be sumbitted electronically at the following URL:
Simultaneous submission to other conferences or journals is only allowed for short papers. These are an opportunity to present innovative ideas (without working out a full paper) and to get feedback from a technically competent audience.

If the quality of the accepted submissions warrants it, there will be a special issue of the Journal of Computer Security devoted to selected papers from the workshop.


9:00 - 10:00
Joint with EXPRESS

Invited presentation:
"A Type Discipline for Authorization in Distributed Systems"
Cédric Fournet
(Microsoft Research - Cambridge, UK)

10:00 - 10:30

Short Paper:
"Symbolic bisimulation for the applied pi calculus"
Stéphanie Delaune, Steve Kremer and Mark Ryan.

10:30 - 11:00 Break

11:00 - 12:30

Session on Static Analysis for Security:

"Detecting and Preventing Type Flaws: a Control Flow Analysis with Tags"
Chiara Bodei, Linda Brodo, Pierpaolo Degano and Han Gao

"Modelling the Security of Smart Cards by Hard and Soft Types for Higher-Order Mobile Embedded Resources"
Mikkel Bundgaard, Thomas Hildebrandt and Jens Chr. Godskesen

"State-oriented noninterference for CCS"
Ilaria Castellani

12:30 - 14:00 Lunch
14:00 - 14:30

"A probabilistic scheduler for the analysis of cryptographic protocols"
Sardaouna Hamadou, Srecko Brlek and John Mullins

14:30 - 17:00

(Break: 15:30-16:00)

Panel Discussion:
"Information hiding: state-of-the-art and emerging trends"
Sabrina De Capitani di Vimercati (Univ. Milano, I): database security;
Steve Kremer (INRIA and ENS Cachan, F): anonymity;
Pasquale Malacaria (Queen Mary, UK): quantified information flow.


  • informal proceedings
  • Steve Kremer's slides on anonymity
  • Pasquale Malacaria's slides on quantified information flow