[prev in list] [next in list] [prev in thread] [next in thread]
List: haskell
Subject: [Haskell] 1st Int. Workshop on Applications of Constraint
From: "Stefano Bistarelli" <stefano.bistarelli () iit ! cnr ! it>
Date: 2005-05-23 13:05:44
Message-ID: 019a01c55f98$231e1950$7e633092 () bistarelli
[Download RAW message or body]
(apologizes for multiple copies)
===================================================================================
1st International Workshop on
Applications of
Constraint Satisfaction and Programming
to
Computer Security
(CPSec)
October 1st, 2005
Barcelona, Spain
Held in conjunction with
11th International Conference on
Principles and Practice of Constraint Programming, CP2005
http://www.sci.unich.it/~bista/organizing/cpsec/
====================================================================================
Call for Paper
====================================================================================
Constraint Satisfaction and Programming is emerging as an effective
practical approach for solving large complex problems. It offers a
significant body of
successful techniques for verifying system properties. Recently, researchers
have begun using advances in constraint programming and solving to solve
security problems, with success. This workshop seeks to act as a catalyst
for this emerging area by exploring the challenges and the potential that
these techniques may offer when applied to security problems.
The use of Constraint Satisfaction and Programming to address security
problems is recent, and it has already produced a number of novel solutions
and insights. For example, constraints have been successfully used in the
the analysis of security protocols, the development of access control models
and mechanisms, firewall configuration and secure system configuration in
general.
Workshop topics include (but are not limited to):
* security models
* information flow
* trust management
* database security
* data and system integrity
* security protocols
* security configuration
* access control
* secure applications
* security trade-offs
Submissions
The workshop aim is to provide a forum where researchers currently working
in the area of security and constraints can discuss their most recent ideas
and
developments and think together about the most promising new directions.
Therefore we encourage the presentation of work in progress or on
specialized aspects of the area. Papers that bridge the gap between theory
and practice are especially welcome.
Prospective attendees can submit a paper, which can be up to 15 pages in
length.
We encourage authors to submit papers electronically in postscript or pdf
format.
Papers should be formatted using the Lecture Notes in Computer Science
(LNCS) style.
Please send your submissions by email to stefano.bistarelli@iit.cnr.it using
the subject line "cpsec-2005 Workshop Submission".
Important Dates
The proposed schedule of important dates for the workshop is as follows:
Paper Submission deadline June 26th
Notification of acceptance July 24th
Camera-ready version deadline August 16th
Workshop Date October 1st
Workshop Organizers:
Giampaolo Bella
Dipartimento di Matematica e Informatica
Universit`a di Catania, Italy
Email: giamp@dmi.unict.it
Web: http://www.dmi.unict.it/~giamp/
and
Stefano Bistarelli (Primary Contact)
Dipartimento di Scienze
Università degli studi "G. D'Annunzio" di Chieti-Pescara, Italy
Email: bista@sci.unich.it
Web: http://www.sci.unich.it/~bista/
and
Istituto di Informatica e Telematica
C.N.R. Pisa, Italy
Email: stefano.bistarelli@iit.cnr.it
and
Simon N. Foley
Department of Computer Science
University College Cork, Ireland
Email: s.foley@cs.ucc.ie
Web: http://www.cs.ucc.ie/~simon/
and
Barry O'Sullivan
Cork Constraint Computation Centre
University College Cork, Ireland
and
Department of Computer Science
University College Cork, Ireland
Email: b.osullivan@cs.ucc.ie
Web: http://www.cs.ucc.ie/~osullb/
Program Committee:
Giampaolo Bella -- Dipartimento di Matematica e Informatica, Universita' di
Catania, Italy
Stefano Bistarelli -- Universita' degli Studi "G. D'annunzio", Pescara,
Italy and IIT-CNR, Pisa, Italy
Yannick Chevalier -- Institut de Recherche en Informatique de Toulouse
(IRIT), France
Giorgio Delzanno -- Dipartimento Informatica e Scienze dell'Informazione,
Università di Genova, Italy
Alessandra Di Pierro -- Dipartimento di Informatica, University of Pisa,
Italy
Fabio Fioravanti -- Universita' degli Studi "G. D'annunzio", Pescara, Italy
Simon Foley -- Department of Computer Science University College Cork,
Ireland
John Herbert -- Department of Computer Science University College Cork,
Ireland
Fabio Martinelli -- Istituto di Informatica e Telematica, CNR, Pisa, Italy
Barry O'Sullivan -- Cork Constraint Computation Centre, University College
Cork, Ireland
Michael Rusinowitch -- INRIA Lorraine, Villers les Nancy, Cedex, France
Justin Pearson -- Department of information technology, Uppsala University,
Sweden
Vitaly Shmatikov -- Department of Computer Sciences, The University of Texas
at Austin, USA
Fred Spiessens -- U.C.L. Louvain-la-Neuve, Belgium
Garret Swart -- I.B.M. Research, USA
Peter Van Roy -- Department of Computing Science and Engineering, Catholic
University of Louvain, Belgium
Luca Vigano -- ETH, Zurich, Switzerland
Duminda Wijesekera -- ISE, George Mason University, USA
Herbert Wiklicky -- Department of Computing, Imperial College London, UK
[Attachment #3 (text/html)]
<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.0 Transitional//EN">
<HTML><HEAD>
<META http-equiv=Content-Type content="text/html; charset=iso-8859-1">
<META content="MSHTML 6.00.2900.2627" name=GENERATOR>
<STYLE></STYLE>
</HEAD>
<BODY bgColor=#ffffff>
<DIV><FONT face=Arial size=2><FONT face="Times New Roman" size=3>(apologizes for
multiple
copies)<BR>=========================================================================== \
========<BR> \
1st International Workshop
on<BR><BR> \
Applications of<BR> Constraint
Satisfaction and
Programming<BR>   \
; \
to<BR> \
Computer
Security<BR> &n \
bsp; \
(CPSec)<BR> \
October 1st,
2005<BR> \
\
Barcelona,
Spain<BR> \
Held in conjunction
with<BR> \
11th International Conference on<BR>Principles and Practice of Constraint
Programming, CP2005<BR><BR> </FONT><A href=""><FONT face="Times New Roman"
size=3>http://www.sci.unich.it/~bista/organizing/cpsec/</FONT></A><BR><BR><FONT
face="Times New Roman"
size=3>=============================================================================== \
=====<BR>   \
; \
Call for
Paper<BR>====================================================================================<BR><BR><BR>Constraint \
Satisfaction and Programming is emerging as an effective <BR>practical approach
for solving large complex problems. It offers a <BR>significant body
of<BR>successful techniques for verifying system properties. Recently,
researchers<BR>have begun using advances in constraint programming and solving
to solve <BR>security problems, with success. This workshop seeks to act as a
catalyst <BR>for this emerging area by exploring the challenges and the
potential that <BR>these techniques may offer when applied to security
problems.<BR><BR>The use of Constraint Satisfaction and Programming to address
security <BR>problems is recent, and it has already produced a number of novel
solutions <BR>and insights. For example, constraints have been successfully used
in the <BR>the analysis of security protocols, the development of access control
models <BR>and mechanisms, firewall configuration and secure system
configuration in <BR>general.<BR><BR>Workshop topics include (but are not
limited to):<BR><BR>* security models<BR>* information flow<BR>* trust
management<BR>* database security<BR>* data and system integrity<BR>* security
protocols<BR>* security configuration<BR>* access control<BR>* secure
applications<BR>* security trade-offs<BR><BR><BR><BR>Submissions<BR><BR>The
workshop aim is to provide a forum where researchers currently working <BR>in
the area of security and constraints can discuss their most recent ideas
<BR>and<BR>developments and think together about the most promising new
directions.<BR>Therefore we encourage the presentation of work in progress or on
<BR>specialized aspects of the area. Papers that bridge the gap between theory
<BR>and practice are especially welcome.<BR><BR>Prospective attendees can submit
a paper, which can be up to 15 pages in <BR>length.<BR>We encourage authors to
submit papers electronically in postscript or pdf <BR>format.<BR>Papers should
be formatted using the Lecture Notes in Computer Science <BR>(LNCS)
style.<BR>Please send your submissions by email to </FONT><A href=""><FONT
face="Times New Roman" size=3>stefano.bistarelli@iit.cnr.it</FONT></A><FONT
face="Times New Roman" size=3> using <BR>the subject line "cpsec-2005 Workshop
Submission".<BR><BR><BR><BR>Important Dates<BR>The proposed schedule of
important dates for the workshop is as follows:<BR><BR>Paper Submission deadline
June 26th<BR>Notification of acceptance July 24th<BR>Camera-ready version
deadline August 16th<BR>Workshop Date October 1st<BR><BR><BR>Workshop
Organizers:<BR><BR> Giampaolo Bella<BR> Dipartimento di
Matematica e Informatica<BR> Universit`a di Catania,
Italy<BR> Email: </FONT><A href=""><FONT face="Times New Roman"
size=3>giamp@dmi.unict.it</FONT></A><BR><FONT face="Times New Roman"
size=3> Web: </FONT><A href=""><FONT face="Times New Roman"
size=3>http://www.dmi.unict.it/~giamp/</FONT></A><BR><BR><FONT
face="Times New Roman" size=3>and<BR><BR> Stefano Bistarelli
(Primary Contact)<BR> Dipartimento di Scienze<BR>
Università degli studi "G. D'Annunzio" di Chieti-Pescara, Italy<BR>
Email: </FONT><A href=""><FONT face="Times New Roman"
size=3>bista@sci.unich.it</FONT></A><BR><FONT face="Times New Roman"
size=3> Web: </FONT><A href=""><FONT face="Times New Roman"
size=3>http://www.sci.unich.it/~bista/</FONT></A><BR><FONT
face="Times New Roman" size=3> and<BR> Istituto di
Informatica e Telematica<BR> C.N.R. Pisa, Italy<BR>
Email: </FONT><A href=""><FONT face="Times New Roman"
size=3>stefano.bistarelli@iit.cnr.it</FONT></A><BR><BR><FONT
face="Times New Roman" size=3>and<BR><BR> Simon N.
Foley<BR> Department of Computer Science<BR> University
College Cork, Ireland<BR> Email: </FONT><A href=""><FONT
face="Times New Roman" size=3>s.foley@cs.ucc.ie</FONT></A><BR><FONT
face="Times New Roman" size=3> Web: </FONT><A href=""><FONT
face="Times New Roman"
size=3>http://www.cs.ucc.ie/~simon/</FONT></A><BR><BR><FONT
face="Times New Roman" size=3>and<BR><BR> Barry
O’Sullivan<BR> Cork Constraint Computation Centre<BR>
University College Cork, Ireland<BR> and<BR> Department
of Computer Science<BR> University College Cork,
Ireland<BR> Email: </FONT><A href=""><FONT face="Times New Roman"
size=3>b.osullivan@cs.ucc.ie</FONT></A><BR><FONT face="Times New Roman"
size=3> Web: </FONT><A href=""><FONT face="Times New Roman"
size=3>http://www.cs.ucc.ie/~osullb/</FONT></A><BR><BR><BR><BR><BR><FONT
face="Times New Roman" size=3>Program Committee:<BR><BR>Giampaolo Bella --
Dipartimento di Matematica e Informatica, Universita' di <BR>Catania,
Italy<BR>Stefano Bistarelli -- Universita' degli Studi “G. D’annunzio”, Pescara,
<BR>Italy and IIT-CNR, Pisa, Italy<BR>Yannick Chevalier -- Institut de Recherche
en Informatique de Toulouse <BR>(IRIT), France<BR>Giorgio Delzanno --
Dipartimento Informatica e Scienze dell'Informazione, <BR>Università di Genova,
Italy<BR>Alessandra Di Pierro -- Dipartimento di Informatica, University of
Pisa, <BR>Italy<BR>Fabio Fioravanti -- Universita' degli Studi “G. D’annunzio”,
Pescara, Italy<BR>Simon Foley -- Department of Computer Science University
College Cork, <BR>Ireland<BR>John Herbert -- Department of Computer Science
University College Cork, <BR>Ireland<BR>Fabio Martinelli -- Istituto di
Informatica e Telematica, CNR, Pisa, Italy<BR>Barry O’Sullivan -- Cork
Constraint Computation Centre, University College <BR>Cork, Ireland<BR>Michael
Rusinowitch -- INRIA Lorraine, Villers les Nancy, Cedex, France<BR>Justin
Pearson -- Department of information technology, Uppsala University,
<BR>Sweden<BR>Vitaly Shmatikov -- Department of Computer Sciences, The
University of Texas <BR>at Austin, USA<BR>Fred Spiessens -- U.C.L.
Louvain-la-Neuve, Belgium<BR>Garret Swart -- I.B.M. Research, USA<BR>Peter Van
Roy -- Department of Computing Science and Engineering, Catholic <BR>University
of Louvain, Belgium<BR>Luca Vigano -- ETH, Zurich, Switzerland<BR>Duminda
Wijesekera -- ISE, George Mason University, USA<BR>Herbert Wiklicky --
Department of Computing, Imperial College London, UK
</FONT><BR></FONT></DIV></BODY></HTML>
[prev in list] [next in list] [prev in thread] [next in thread]
Configure |
About |
News |
Add a list |
Sponsored by KoreLogic