Computer security is an established field of Computer Science of both theoretical and practical significance. In recent years, there has been increasing interest in logic-based foundations for various methods in computer security, including the formal specification, analysis and design of cryptographic protocols and their applications, the formal definition of various aspects of security such as access control mechanisms, mobile code security and denial-of-service attacks, and the modeling of information flow and its application to confidentiality policies, system composition, and covert channel analysis.
The aim of this workshop is to provide a forum for continued activity in this area, to bring computer security researchers in contact with the LICS'03 community, and to give LICS attendees an opportunity to talk to experts in computer security.
Formal specification
Foundations of verification Logic-based design Information flow analysis Security models Language-based security Static analysis Composition issues Statistical methods |
for |
cryptographic protocols and applications
confidentiality and authentication integrity and privacy availability and denial of service security policies covert channels mobile code intrusion detection malicious code confinement |
The proceedings will be made available in electronic format and they will be distributed to all participants of the workshop. The authors of the best papers will be invited to submit an extended revision for inclusion in a special issue of a journal.
EXTENDED Submission deadline: | March 30, 2003 |
Notification of acceptance: | May 7, 2003 |
Final papers: | May 30, 2003 |
Workshop: | June 26-27, 2003 |
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
(Move the mouse over the icon to see the interests of each member. You can also click here.)
For further information contact:
Program Chair |
Iliano Cervesato
ITT Industries, Inc. - AES Division 2560 Huntington Avenue Alexandria, VA 22303-1410 - USA +1-202-404-4909 |