[prev in list] [next in list] [prev in thread] [next in thread] 

List:       haskell
Subject:    [Haskell] 1st Int. Workshop on Applications of Constraint
From:       "Stefano Bistarelli" <stefano.bistarelli () iit ! cnr ! it>
Date:       2005-05-23 13:05:44
Message-ID: 019a01c55f98$231e1950$7e633092 () bistarelli
[Download RAW message or body]

(apologizes for multiple copies)
===================================================================================
                  1st International Workshop on

                          Applications of
         Constraint Satisfaction and Programming
                                    to
                        Computer Security
                                 (CPSec)
                         October 1st, 2005
                             Barcelona, Spain
                      Held in conjunction with
                   11th International Conference on
Principles and Practice of Constraint Programming, CP2005

  http://www.sci.unich.it/~bista/organizing/cpsec/

====================================================================================
                              Call for Paper
====================================================================================


Constraint Satisfaction and Programming is emerging as an effective 
practical approach for solving large complex problems. It offers a 
significant body of
successful techniques for verifying system properties. Recently, researchers
have begun using advances in constraint programming and solving to solve 
security problems, with success. This workshop seeks to act as a catalyst 
for this emerging area by exploring the challenges and the potential that 
these techniques may offer when applied to security problems.

The use of Constraint Satisfaction and Programming to address security 
problems is recent, and it has already produced a number of novel solutions 
and insights. For example, constraints have been successfully used in the 
the analysis of security protocols, the development of access control models 
and mechanisms, firewall configuration and secure system configuration in 
general.

Workshop topics include (but are not limited to):

* security models
* information flow
* trust management
* database security
* data and system integrity
* security protocols
* security configuration
* access control
* secure applications
* security trade-offs



Submissions

The workshop aim is to provide a forum where researchers currently working 
in the area of security and constraints can discuss their most recent ideas 
and
developments and think together about the most promising new directions.
Therefore we encourage the presentation of work in progress or on 
specialized aspects of the area. Papers that bridge the gap between theory 
and practice are especially welcome.

Prospective attendees can submit a paper, which can be up to 15 pages in 
length.
We encourage authors to submit papers electronically in postscript or pdf 
format.
Papers should be formatted using the Lecture Notes in Computer Science 
(LNCS) style.
Please send your submissions by email to stefano.bistarelli@iit.cnr.it using 
the subject line "cpsec-2005 Workshop Submission".



Important Dates
The proposed schedule of important dates for the workshop is as follows:

Paper Submission deadline June 26th
Notification of acceptance July 24th
Camera-ready version deadline August 16th
Workshop Date October 1st


Workshop Organizers:

   Giampaolo Bella
   Dipartimento di Matematica e Informatica
   Universit`a di Catania, Italy
   Email: giamp@dmi.unict.it
   Web: http://www.dmi.unict.it/~giamp/

and

   Stefano Bistarelli (Primary Contact)
   Dipartimento di Scienze
   Università degli studi "G. D'Annunzio" di Chieti-Pescara, Italy
   Email: bista@sci.unich.it
   Web: http://www.sci.unich.it/~bista/
   and
   Istituto di Informatica e Telematica
   C.N.R. Pisa, Italy
   Email: stefano.bistarelli@iit.cnr.it

and

   Simon N. Foley
   Department of Computer Science
   University College Cork, Ireland
   Email: s.foley@cs.ucc.ie
   Web: http://www.cs.ucc.ie/~simon/

and

   Barry O'Sullivan
   Cork Constraint Computation Centre
   University College Cork, Ireland
   and
   Department of Computer Science
   University College Cork, Ireland
   Email: b.osullivan@cs.ucc.ie
   Web: http://www.cs.ucc.ie/~osullb/




Program Committee:

Giampaolo Bella -- Dipartimento di Matematica e Informatica, Universita' di 
Catania, Italy
Stefano Bistarelli -- Universita' degli Studi "G. D'annunzio", Pescara, 
Italy and IIT-CNR, Pisa, Italy
Yannick Chevalier -- Institut de Recherche en Informatique de Toulouse 
(IRIT), France
Giorgio Delzanno -- Dipartimento Informatica e Scienze dell'Informazione, 
Università di Genova, Italy
Alessandra Di Pierro -- Dipartimento di Informatica, University of Pisa, 
Italy
Fabio Fioravanti -- Universita' degli Studi "G. D'annunzio", Pescara, Italy
Simon Foley -- Department of Computer Science University College Cork, 
Ireland
John Herbert -- Department of Computer Science University College Cork, 
Ireland
Fabio Martinelli -- Istituto di Informatica e Telematica, CNR, Pisa, Italy
Barry O'Sullivan -- Cork Constraint Computation Centre, University College 
Cork, Ireland
Michael Rusinowitch -- INRIA Lorraine, Villers les Nancy, Cedex, France
Justin Pearson -- Department of information technology, Uppsala University, 
Sweden
Vitaly Shmatikov -- Department of Computer Sciences, The University of Texas 
at Austin, USA
Fred Spiessens -- U.C.L. Louvain-la-Neuve, Belgium
Garret Swart -- I.B.M. Research, USA
Peter Van Roy -- Department of Computing Science and Engineering, Catholic 
University of Louvain, Belgium
Luca Vigano -- ETH, Zurich, Switzerland
Duminda Wijesekera -- ISE, George Mason University, USA
Herbert Wiklicky -- Department of Computing, Imperial College London, UK 

[Attachment #3 (text/html)]

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.0 Transitional//EN">
<HTML><HEAD>
<META http-equiv=Content-Type content="text/html; charset=iso-8859-1">
<META content="MSHTML 6.00.2900.2627" name=GENERATOR>
<STYLE></STYLE>
</HEAD>
<BODY bgColor=#ffffff>
<DIV><FONT face=Arial size=2><FONT face="Times New Roman" size=3>(apologizes for 
multiple 
copies)<BR>=========================================================================== \
========<BR>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; \
 1st International Workshop 
on<BR><BR>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; \
 Applications of<BR>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Constraint 
Satisfaction and 
Programming<BR>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp \
;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; \
 to<BR>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; \
 Computer 
Security<BR>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&n \
bsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; \
 (CPSec)<BR>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; \
 October 1st, 
2005<BR>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; \
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; \
 Barcelona, 
Spain<BR>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; \
 Held in conjunction 
with<BR>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; \
 11th International Conference on<BR>Principles and Practice of Constraint 
Programming, CP2005<BR><BR>&nbsp; </FONT><A href=""><FONT face="Times New Roman" 
size=3>http://www.sci.unich.it/~bista/organizing/cpsec/</FONT></A><BR><BR><FONT 
face="Times New Roman" 
size=3>=============================================================================== \
=====<BR>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp \
;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; \
 Call for 
Paper<BR>====================================================================================<BR><BR><BR>Constraint \
 Satisfaction and Programming is emerging as an effective <BR>practical approach 
for solving large complex problems. It offers a <BR>significant body 
of<BR>successful techniques for verifying system properties. Recently, 
researchers<BR>have begun using advances in constraint programming and solving 
to solve <BR>security problems, with success. This workshop seeks to act as a 
catalyst <BR>for this emerging area by exploring the challenges and the 
potential that <BR>these techniques may offer when applied to security 
problems.<BR><BR>The use of Constraint Satisfaction and Programming to address 
security <BR>problems is recent, and it has already produced a number of novel 
solutions <BR>and insights. For example, constraints have been successfully used 
in the <BR>the analysis of security protocols, the development of access control 
models <BR>and mechanisms, firewall configuration and secure system 
configuration in <BR>general.<BR><BR>Workshop topics include (but are not 
limited to):<BR><BR>* security models<BR>* information flow<BR>* trust 
management<BR>* database security<BR>* data and system integrity<BR>* security 
protocols<BR>* security configuration<BR>* access control<BR>* secure 
applications<BR>* security trade-offs<BR><BR><BR><BR>Submissions<BR><BR>The 
workshop aim is to provide a forum where researchers currently working <BR>in 
the area of security and constraints can discuss their most recent ideas 
<BR>and<BR>developments and think together about the most promising new 
directions.<BR>Therefore we encourage the presentation of work in progress or on 
<BR>specialized aspects of the area. Papers that bridge the gap between theory 
<BR>and practice are especially welcome.<BR><BR>Prospective attendees can submit 
a paper, which can be up to 15 pages in <BR>length.<BR>We encourage authors to 
submit papers electronically in postscript or pdf <BR>format.<BR>Papers should 
be formatted using the Lecture Notes in Computer Science <BR>(LNCS) 
style.<BR>Please send your submissions by email to </FONT><A href=""><FONT 
face="Times New Roman" size=3>stefano.bistarelli@iit.cnr.it</FONT></A><FONT 
face="Times New Roman" size=3> using <BR>the subject line "cpsec-2005 Workshop 
Submission".<BR><BR><BR><BR>Important Dates<BR>The proposed schedule of 
important dates for the workshop is as follows:<BR><BR>Paper Submission deadline 
June 26th<BR>Notification of acceptance July 24th<BR>Camera-ready version 
deadline August 16th<BR>Workshop Date October 1st<BR><BR><BR>Workshop 
Organizers:<BR><BR>&nbsp;&nbsp; Giampaolo Bella<BR>&nbsp;&nbsp; Dipartimento di 
Matematica e Informatica<BR>&nbsp;&nbsp; Universit`a di Catania, 
Italy<BR>&nbsp;&nbsp; Email: </FONT><A href=""><FONT face="Times New Roman" 
size=3>giamp@dmi.unict.it</FONT></A><BR><FONT face="Times New Roman" 
size=3>&nbsp;&nbsp; Web: </FONT><A href=""><FONT face="Times New Roman" 
size=3>http://www.dmi.unict.it/~giamp/</FONT></A><BR><BR><FONT 
face="Times New Roman" size=3>and<BR><BR>&nbsp;&nbsp; Stefano Bistarelli 
(Primary Contact)<BR>&nbsp;&nbsp; Dipartimento di Scienze<BR>&nbsp;&nbsp; 
Università degli studi "G. D'Annunzio" di Chieti-Pescara, Italy<BR>&nbsp;&nbsp; 
Email: </FONT><A href=""><FONT face="Times New Roman" 
size=3>bista@sci.unich.it</FONT></A><BR><FONT face="Times New Roman" 
size=3>&nbsp;&nbsp; Web: </FONT><A href=""><FONT face="Times New Roman" 
size=3>http://www.sci.unich.it/~bista/</FONT></A><BR><FONT 
face="Times New Roman" size=3>&nbsp;&nbsp; and<BR>&nbsp;&nbsp; Istituto di 
Informatica e Telematica<BR>&nbsp;&nbsp; C.N.R. Pisa, Italy<BR>&nbsp;&nbsp; 
Email: </FONT><A href=""><FONT face="Times New Roman" 
size=3>stefano.bistarelli@iit.cnr.it</FONT></A><BR><BR><FONT 
face="Times New Roman" size=3>and<BR><BR>&nbsp;&nbsp; Simon N. 
Foley<BR>&nbsp;&nbsp; Department of Computer Science<BR>&nbsp;&nbsp; University 
College Cork, Ireland<BR>&nbsp;&nbsp; Email: </FONT><A href=""><FONT 
face="Times New Roman" size=3>s.foley@cs.ucc.ie</FONT></A><BR><FONT 
face="Times New Roman" size=3>&nbsp;&nbsp; Web: </FONT><A href=""><FONT 
face="Times New Roman" 
size=3>http://www.cs.ucc.ie/~simon/</FONT></A><BR><BR><FONT 
face="Times New Roman" size=3>and<BR><BR>&nbsp;&nbsp; Barry 
O’Sullivan<BR>&nbsp;&nbsp; Cork Constraint Computation Centre<BR>&nbsp;&nbsp; 
University College Cork, Ireland<BR>&nbsp;&nbsp; and<BR>&nbsp;&nbsp; Department 
of Computer Science<BR>&nbsp;&nbsp; University College Cork, 
Ireland<BR>&nbsp;&nbsp; Email: </FONT><A href=""><FONT face="Times New Roman" 
size=3>b.osullivan@cs.ucc.ie</FONT></A><BR><FONT face="Times New Roman" 
size=3>&nbsp;&nbsp; Web: </FONT><A href=""><FONT face="Times New Roman" 
size=3>http://www.cs.ucc.ie/~osullb/</FONT></A><BR><BR><BR><BR><BR><FONT 
face="Times New Roman" size=3>Program Committee:<BR><BR>Giampaolo Bella -- 
Dipartimento di Matematica e Informatica, Universita' di <BR>Catania, 
Italy<BR>Stefano Bistarelli -- Universita' degli Studi “G. D’annunzio”, Pescara, 
<BR>Italy and IIT-CNR, Pisa, Italy<BR>Yannick Chevalier -- Institut de Recherche 
en Informatique de Toulouse <BR>(IRIT), France<BR>Giorgio Delzanno -- 
Dipartimento Informatica e Scienze dell'Informazione, <BR>Università di Genova, 
Italy<BR>Alessandra Di Pierro -- Dipartimento di Informatica, University of 
Pisa, <BR>Italy<BR>Fabio Fioravanti -- Universita' degli Studi “G. D’annunzio”, 
Pescara, Italy<BR>Simon Foley -- Department of Computer Science University 
College Cork, <BR>Ireland<BR>John Herbert -- Department of Computer Science 
University College Cork, <BR>Ireland<BR>Fabio Martinelli -- Istituto di 
Informatica e Telematica, CNR, Pisa, Italy<BR>Barry O’Sullivan -- Cork 
Constraint Computation Centre, University College <BR>Cork, Ireland<BR>Michael 
Rusinowitch -- INRIA Lorraine, Villers les Nancy, Cedex, France<BR>Justin 
Pearson -- Department of information technology, Uppsala University, 
<BR>Sweden<BR>Vitaly Shmatikov -- Department of Computer Sciences, The 
University of Texas <BR>at Austin, USA<BR>Fred Spiessens -- U.C.L. 
Louvain-la-Neuve, Belgium<BR>Garret Swart -- I.B.M. Research, USA<BR>Peter Van 
Roy -- Department of Computing Science and Engineering, Catholic <BR>University 
of Louvain, Belgium<BR>Luca Vigano -- ETH, Zurich, Switzerland<BR>Duminda 
Wijesekera -- ISE, George Mason University, USA<BR>Herbert Wiklicky -- 
Department of Computing, Imperial College London, UK 
</FONT><BR></FONT></DIV></BODY></HTML>



[prev in list] [next in list] [prev in thread] [next in thread] 

Configure | About | News | Add a list | Sponsored by KoreLogic