SCOPE AND TOPICS
Emerging trends in concurrency theory require the definition of models and languages adequate for the design
and management of new classes of applications, mainly to program either WANs (like Internet) or smaller
networks of mobile and portable devices (which support applications based on a dynamically reconfigurable
communication structure). Due to the openness of these systems, new critical aspects come into play, such as
the need to deal with malicious components or with a hostile environment. Current research on network security
issues (e.g. secrecy, authentication, etc.) usually focuses on opening cryptographic point-to-point tunnels.
Therefore, the proposed solutions in this area are not always exploitable to support the end-to-end secure
interaction between entities whose availability or location is not known beforehand.
The aim of the workshop is to cover the gap between the security and the concurrency communities.
More precisely, the workshop promotes the exchange of ideas, trying to focus on common interests
and stimulating discussions on central research questions. In particular, we look for papers dealing with
security issues (such as authentication, integrity, privacy, confidentiality, access control, denial of service,
service availability, safety aspects, fault tolerance, trust, language-based security) in emerging fields like
web services, mobile ad-hoc networks, agent-based infrastructures, peer-to-peer systems, context-aware computing,
PANEL DISCUSSION: "Information hiding: state-of-the-art
and emerging trends"
The last afternoon session will host a panel that will be a venue where researchers from different areas of
computer security will present common/orthogonal problems, techniques and goals related
to information hiding. We shall cover aspects like data secrecy, anonymity, database security,
... approached from different points of view (language-based
security, quantitative aspects, access control, ...). The panelists are:
Sabrina De Capitani di Vimercati (Univ. Milano, I)
Steve Kremer (INRIA and ENS Cachan, F)
Pasquale Malacaria (Queen Mary, UK)
They will present their point of view on the topic and
take questions from the audience. Active participation in the discussion by the
audience will be encouraged.
(Univ. di Roma "La Sapienza", IT)
(INRIA and Ecole polytechnique, F)
Michael Backes (Saarland Univ., G)
Tom Chothia (CWI, NL)
Véronique Cortier (CNRS Loria, F)
Yuxin Deng (Univ. of New South Wales, AUS)
Heiko Mantel (RWTH, G)
Mogens Nielsen (BRICS, DK)
Flemming Nielson (DTU, DK)
Mark Ryan (Univ. of Birmingham, UK)
Luca Viganò (Univ. Verona, IT)
Jan Vitek (Purdue Univ., USA)
(joint with EXPRESS'07)
Cédric Fournet (Microsoft Research - Cambridge, UK)
Submission of abstracts: June 4th, 2007
Submission of papers: June 7th, 2007
Notification: July 13th, 2007
Pre-Final version: July 23rd, 2007
Meeting date: September 3rd, 2007
Final version: September 28th, 2007
The workshop proceedings will be published in the
(Electronic Notes in Theoretical Computer Science); we thus encourage
submissions already in that format. Submissions may be of two kinds:
short papers (not included in the proceedings; up to 5 ENTCS pages) and
regular papers (up to 15 ENTCS pages, including bibliography).
Papers must be sumbitted electronically at the following URL:
Simultaneous submission to other conferences or journals is only
allowed for short papers. These are an opportunity to present
innovative ideas (without working out a full paper) and to get
feedback from a technically competent audience.
If the quality of the accepted
submissions warrants it, there will be a special issue of the
Journal of Computer Security
devoted to selected papers from the workshop.