|  |  |  | FAST 2006 is affiliated 14th Formal Methods Symposium  (FM’06)
			and sponsored by IFIP WG 1.7 "Theoretical Foundations of Security
Analysis and Design" 
 
 
August 26-27 2006, Hamilton, Ontario, Canada
 
   
 
				
					|  | List of accepted papers 
is available! |  OVERVIEW 
The fourth international Workshop on Formal Aspects in
Security and Trust (FAST2006) aims at continuing the successful effort of 
 the first three FAST workshops for fostering the cooperation among researchers in the 
            areas of security and trust. The new challenges offered by the so-called 
            ambient intelligence space as a future paradigm in the information 
            society demand for a coherent framework of concepts, tools and methodologies 
            to enable user's trust&confidence on the underlying
computing  
            infrastructure. These need to address issues relating to both guaranteeing 
            security of the infrastructure and the perception of the infrastructure 
            being secure. In addition, user confidence on what is happening must 
            be enhanced by developing trust models effective but also easily comprehensible 
            and manageable by users.
 The 
            complexity and scale of deployment of emerging ICT systems based on 
            web service and grid computing concepts also necessitates the investigation 
            of new, scalable and more flexible foundational models of enforcing 
            pervasive security across organizational borders and in situations 
            where there is high uncertainty about the identity and
          trustworthyness 
            of the participating networked entities (including users, services 
            and resources). The increasing need of building activities sharing 
            different resources managed with different policies demands for new 
            and business enabling models of trust between members of virtual communities 
            including virtual organizations that span across the boundaries of 
            physical enterprises and loosely structured communities of individuals.   IMPORTANT 
              DATES 
               Papers submission: 05 July 2006 (EXTENDED!!) Author Notification: 29 July 2006
 Pre-proceedings version: 10 August2006
 Workshop: 26-27 August 2006
 Post-proceedings version: 30 September 2006
 
 
			
 PROGRAMME 
              COMMITTE 
 ·Gilles Barthe, INRIA Sophia-Antipolis, France ·Stefano Bistarelli, University of Pescara, Italy
 ·Gregor v. Bochmann, University of Ottawa, Canada
 ·John A Clark, University of york, UK
 ·Fre'de'ric Cuppens, ENST Bretagne, France
 ·Roberto Gorrieri, University of Bologna, Italy
 ·Joshua D. Guttman, MITRE, USA
 ·Masami Hagiya, University of Tokyo, Japan
 ·Chris Hankin, Imperial College (London), UK
 ·Christian Jensen, DTU, Denmark
 ·Audun Josang, DSTC, Australia
 ·Jan Jürjens, TU München, Germany
 ·Yuecel karabulut, SAP, Germany
 ·Igor Kotenko, SPIIRAS, Russia
 ·Heiko Krumm, University of Dortmund, Germany
 ·Ninghui Li, Purdue University, USA
 ·Steve Marsh, Institute for Information Technology, NRC, Canada
 ·Catherine Meadows, Naval Research Lab, USA
 ·Ron van der Meyden, University of New South Wales, Australia
 ·Mogens Nielsen, University of Aarhus, Denmark
 ·Flemming Nielson, Danish Technical University, Denmark
 ·Indrajit Ray, Colorado State University, USA
 ·Babak Sadighi Firozabadi, SICS, Sweden,
 ·Pierangela Samarati, University of Milan, Italy
 ·Jean-Marc Seigneur, University of Geneva, Switzerland
 ·Ketil Stolen, SINTEF, Norway
 ·Paul Syverson, Naval Research Laboratory, USA
 ·William H. Winsborough, University of Texas at San Antonio, USA
 
 INVITED SPEAKERS 
         
              ·Joshua D. Guttman, MITRE, USA 
 
 ORGANIZERS · Theo Dimitrakos, BT
 · Fabio Martinelli, IIT-CNR
 · Peter Ryan, University of Newcastle
 · Steve Schneider, University of Surrey
 
    LOCAL ORGANIZATION · Alessandro Falleni, IIT-CNR
 
  
Contacts  
Send an e-mail to FAST2006 X iit.cnr.it (where "X" stands for "@")  Latest updates about FAST 2006 will be regularly posted to
security@fosad.org (a
mailing list for the scientific community interested in computer
security). PAPER 
              SUBMISSION Topics: Suggested 
              submission topics include, but are not limited to, formal aspects of:  · Models for security, trust and reputation· Security protocol design and analysis
 · Logics for security and trust
 · Trust-based reasoning
 · Distributed Trust Management Systems
 · Digital Assets Protection
 · Data protection
 · Privacy and ID management  issues
 · Information flow analysis
 · Language-based security
 · Security and Trust aspects in ubiquitous computing
 · Validation/Analysis tools and techniques
 · Web/Grid Services Security/Trust/Privacy
 · Security and Risk Assessment
 · Case studies
 
 Instructions: Papers presenting original contributions are sought. Two formats of submissions are possible:  1) short papers, up to 5 pages,  2) full papers, up to 15 
pages. Submissions should clearly state their category (1 or 2). Author's full name, address, and e-mail must appear in the cover page. The program is now available  hereAccepted full papers will be published in the formal post-proceedings. 
Short papers will be published in the informal proceedings distributed 
at the workshop (together with the accepted full papers).
After the workshop, authors of short papers which are judged mature for publication 
will be invited to submit full papers. These will be reviewed according to the usual refereeing 
procedures, and accepted papers will be published in the post-proceedings on LNCS 
(together with the accepted full papers).
 Simultaneous
        submission of full papers to a journal or conference/workshop with
formal proceedings is not allowed.
 
 Follow 
this 
link to submit your paper through Easychair system
 
 
 PROCEEDINGS  
              Follow this link  http://www.springerlink.com/content/978-3-540-75226-4/ for LNCS Proceedings 
 and this one  http://www.springerlink.com/content/e37nm31401676330/   for the 
  special journal issue on International Journal of Information Security.   PROGRAMME   GRANTS 
                
            TBA REGISTRATION  
            Follow the instructions at  (FM’06)
			page.
            ACCOMMODATION Follow this   link WORKSHOP VENUE  McMaster UniversityHamilton, Ontario, Canada
 For more information follow this    link
   SPONSORS 
  
 
  
 
 
 
 
 
   
 |  |  |  |