FAST 2006 is affiliated 14th Formal Methods Symposium (FM’06) and sponsored by IFIP WG 1.7 "Theoretical Foundations of Security Analysis and Design"

August 26-27 2006, Hamilton, Ontario, Canada

List of accepted papers is available!


The fourth international Workshop on Formal Aspects in Security and Trust (FAST2006) aims at continuing the successful effort of the first three FAST workshops for fostering the cooperation among researchers in the areas of security and trust. The new challenges offered by the so-called ambient intelligence space as a future paradigm in the information society demand for a coherent framework of concepts, tools and methodologies to enable user's trust&confidence on the underlying computing infrastructure. These need to address issues relating to both guaranteeing security of the infrastructure and the perception of the infrastructure being secure. In addition, user confidence on what is happening must be enhanced by developing trust models effective but also easily comprehensible and manageable by users.

The complexity and scale of deployment of emerging ICT systems based on web service and grid computing concepts also necessitates the investigation of new, scalable and more flexible foundational models of enforcing pervasive security across organizational borders and in situations where there is high uncertainty about the identity and trustworthyness of the participating networked entities (including users, services and resources). The increasing need of building activities sharing different resources managed with different policies demands for new and business enabling models of trust between members of virtual communities including virtual organizations that span across the boundaries of physical enterprises and loosely structured communities of individuals.




Papers submission: 05 July 2006 (EXTENDED!!)
Author Notification: 29 July 2006
Pre-proceedings version: 10 August2006
Workshop: 26-27 August 2006
Post-proceedings version: 30 September 2006


·Gilles Barthe, INRIA Sophia-Antipolis, France
·Stefano Bistarelli, University of Pescara, Italy
·Gregor v. Bochmann, University of Ottawa, Canada
·John A Clark, University of york, UK
·Fre'de'ric Cuppens, ENST Bretagne, France
·Roberto Gorrieri, University of Bologna, Italy
·Joshua D. Guttman, MITRE, USA
·Masami Hagiya, University of Tokyo, Japan
·Chris Hankin, Imperial College (London), UK
·Christian Jensen, DTU, Denmark
·Audun Josang, DSTC, Australia
·Jan Jürjens, TU München, Germany
·Yuecel karabulut, SAP, Germany
·Igor Kotenko, SPIIRAS, Russia
·Heiko Krumm, University of Dortmund, Germany
·Ninghui Li, Purdue University, USA
·Steve Marsh, Institute for Information Technology, NRC, Canada
·Catherine Meadows, Naval Research Lab, USA
·Ron van der Meyden, University of New South Wales, Australia
·Mogens Nielsen, University of Aarhus, Denmark
·Flemming Nielson, Danish Technical University, Denmark
·Indrajit Ray, Colorado State University, USA
·Babak Sadighi Firozabadi, SICS, Sweden,
·Pierangela Samarati, University of Milan, Italy
·Jean-Marc Seigneur, University of Geneva, Switzerland
·Ketil Stolen, SINTEF, Norway
·Paul Syverson, Naval Research Laboratory, USA
·William H. Winsborough, University of Texas at San Antonio, USA


·Joshua D. Guttman, MITRE, USA


· Theo Dimitrakos, BT
· Fabio Martinelli, IIT-CNR
· Peter Ryan, University of Newcastle
· Steve Schneider, University of Surrey



· Alessandro Falleni, IIT-CNR


  Send an e-mail to FAST2006 X (where "X" stands for "@")

Latest updates about FAST 2006 will be regularly posted to (a mailing list for the scientific community interested in computer security).



Suggested submission topics include, but are not limited to, formal aspects of:

· Models for security, trust and reputation
· Security protocol design and analysis
· Logics for security and trust
· Trust-based reasoning
· Distributed Trust Management Systems
· Digital Assets Protection
· Data protection
· Privacy and ID management issues
· Information flow analysis
· Language-based security
· Security and Trust aspects in ubiquitous computing
· Validation/Analysis tools and techniques
· Web/Grid Services Security/Trust/Privacy
· Security and Risk Assessment
· Case studies


Papers presenting original contributions are sought. Two formats of submissions are possible: 

1) short papers, up to 5 pages, 

2) full papers, up to 15 pages.

Submissions should clearly state their category (1 or 2). Author's full name, address, and e-mail must appear in the cover page.
Accepted full papers will be published in the formal post-proceedings. Short papers will be published in the informal proceedings distributed at the workshop (together with the accepted full papers). After the workshop, authors of short papers which are judged mature for publication will be invited to submit full papers. These will be reviewed according to the usual refereeing procedures, and accepted papers will be published in the post-proceedings on LNCS (together with the accepted full papers). Simultaneous submission of full papers to a journal or conference/workshop with formal proceedings is not allowed.

Follow this link to submit your paper through Easychair system

The post proceedings of the Conference will be published by Springer in the Lecture Notes in Computer Science series. Submissions must be in English and authors should ensure that papers are formatted according to the LNCS format (see author's instructions given on


Follow this link for LNCS Proceedings and this one for the special journal issue on International Journal of Information Security.



The program is now available here





Follow the instructions at (FM’06) page.


Follow this link


McMaster University
Hamilton, Ontario, Canada
For more information follow this link