FAST 2005 is affiliated 13th Formal Methods Symposium (FM’05) and sponsored by IFIP WG 1.7 "Theoretical Foundations of Security Analysis and Design"


The third international Workshop on Formal Aspects in Security and Trust (FAST2005) aims at continuing the successful effort of the first two FAST workshops for fostering the cooperation among researchers in the areas of security and trust. The new challenges offered by the so-called ambient intelligence space as a future paradigm in the information society demand for a coherent framework of concepts, tools and methodologies to enable user's trust&confidence on the underlying computing infrastructure. These need to address issues relating to both guaranteeing security of the infrastructure and the perception of the infrastructure being secure. In addition, user confidence on what is happening must be enhanced by developing trust models effective but also easily comprehensible and manageable by users.

The complexity and scale of deployment of emerging ICT systems based on web service and grid computing concepts also necessitates the investigation of new, scalable and more flexible foundational models of enforcing pervasive security across organizational borders and in situations where there is high uncertainty about the identity and trustworthyness of the participating networked entities (including users, services and resources). The increasing need of building activities sharing different resources managed with different policies demands for new and business enabling models of trust between members of virtual communities including virtual organizations that span across the boundaries of physical enterprises and loosely structured communities of individuals.




Paper Abstract Submission: 9 May 2005 (Extended!)
Full/short papers submission: 14 May 2005
Author Notification: 10 June 2005
Pre-proceedings version: 20 June 2005
Workshop: 18-19 July 2005
Post-proceedings version: 20 October 2005


·Elisa Bertino, Purdue University, USA
·John A Clark, University of york, UK
·Fre'de'ric Cuppens, ENST Bretagne, France
·Rino Falcone, ISTC-CNR, Italy
·Simon Foley, University College Cork, Ireland
·Roberto Gorrieri, University of Bologna, Italy
·Masami Hagiya, University of Tokyo, Japan
·Chris Hankin, Imperial College (London), UK
·Valerie Issarny, INRIA, France
·Christian Jensen, DTU, Denmark
·Audun Josang, DSTC, Australia
·Jan Jürjens, TU München, Germany
·Yuecel karabulut, SAP, Germany
·Igor Kotenko, SPIIRAS, Russia
·Heiko Krumm, University of Dortmund, Germany
·Fabio Massacci, University of Trento, Italy
·Stefan Poslad, Queen Mary College, UK
·Catherine Meadows, Naval Research Lab, USA
·Ron van der Meyden, University of New South Wales, Australia
·Andrew Myers, Cornell University, USA
·Mogens Nielsen, University of Aarhus, Denmark
·Indrajit Ray, Colorado State University, USA
·babak Sadighi Firozabadi, SICS, Sweden,
·Pierangela Samarati, University of Milan, Italy
·Ketil Stolen, SINTEF, Norway
·Kymie Tan, Carnegie Mellon University, USA
·William H. Winsborough, George Mason University, USA


· Cédric Fournet, Microsoft Research (Cambridge)
· Brian Randell, University of Newcastle



· Theo Dimitrakos, BT
· Fabio Martinelli, IIT-CNR
· Peter Ryan, University of Newcastle
· Steve Schneider, University of Surrey



· Alessandro Falleni, IIT-CNR
· Ilaria Matteucci, IIT-CNR


  Send an e-mail to FAST2005 X @ (where "X" stands for "@")

Latest updates about FAST 2005 will be regularly posted to (a mailing list for the scientific community interested in computer security).



Suggested submission topics include, but are not limited to, formal aspects of:

· Models for security, trust and reputation
· Security protocol design and analysis
· Logics for security and trust
· Trust-based reasoning
· Distributed Trust Management Systems
· Digital Assets Protection
· Data protection
· Privacy and ID management issues
· Information flow analysis
· Language-based security
· Security and Trust aspects in ubiquitous computing
· Validation/Analysis tools and techniques
· Web/Grid Services Security/Trust/Privacy
· Security and Risk Assessment
· Case studies


Papers presenting original contributions are sought. Two formats of submissions are possible: 

1) short papers, up to 5 pages, 

2) full papers, up to 14 pages.

Submissions should clearly state their category (1 or 2). Papers should be written with 11pt or larger font and reasonable margins and line spacing. Author's full name, address, and e-mail must appear in the cover page.
Accepted full papers will be published in the formal post-proceedings. Short papers will be published in the informal proceedings distributed at the workshop (together with the accepted full papers). After the workshop, authors of short papers which are judged mature for publication will be invited to submit full papers. These will be reviewed according to the usual refereeing procedures, and accepted papers will be published in the post-proceedings on LNCS (together with the accepted full papers). Simultaneous submission of full papers to a journal or conference/workshop with formal proceedings is not allowed.
Follow this link to submit your paper.


Publication of the post-proceedings of the workshop is planned with LNCS (see the volume detalis (here) . A special issue with a selection of the best papers of FAST 2004 and FAST 2005 will be published on the International Journal of Information Security (IJIS).



A preliminary programme is now available ( pdf , txt )





Follow the instructions at (FM’05) page.


Follow this link


Curtis Auditorium, The Herschel Building, University of Newcastle Upon Tyne.