WISP 2004
        2nd International Workshop on Security Issues
        with Petri Nets and other Computational Models
                      Bologna (Italy)
                       26 June 2004


               Preliminary Call for Papers


The 2nd International Workshop on Security Issues with Petri
Net sand other Computational Models (WISP2004) aims at promoting
research about theoretical foundations of security analysis and
design with formal methods and languages. WISP2004 starts from
the positive experience with WISP2003, held in Eindhoven within
the 24th International Conference on Application and Theory of
Petri Nets (ICATPN'03). WISP2004 is co-located and will be hold
just after the 25th International Conference on Application and
Theory of Petri Nets (ICATPN'04). Hence, original papers on the
application of Petri Nets for security issues are particularly
welcome. Also papers on security in other system models are
sought as well.

This year, WISP has a special focus in security aspects related
to coordination, composition and management of complex
e-services. Indeed, the rapid growth of the Internet as a
medium both for communication and computation fostered the
development of commercial products for distributed computation,
business process and workflow management. In such frameworks,
the information is seamless exchanged, accessed and manipulated
by many components and users with different goals, privileges
and obligations. Confidentiality, integrity and availability of
information need to be ensured during the whole lifetime cycle
of such e-services, even in presence of abnormal behavior.
Monitoring and enforcing security may be considered much more
challenging than in common communication protocols. Formal
methods communities, and henceforth the Petri nets one, may
successfully contribute also in this area to enrich the existing
set of tools and techniques and thus to enhance user confidence
on e-services.

Suggested submission topics include:
- security issues in orchestration and composition of e-services
- comparison and classification of security models
- formal definition and verification of the various aspects of
   security: confidentiality, integrity, authentication and
- information flow analysis
- security issues in probabilistic and real-time models
- mobile code security
- tools and techniques for the formal analysis of e-services
- applications to E/M-commerce
- case studies

WISP2004 is a one-day workshop sponsored by the IFIP WG 1.7 on
"Theoretical Foundations of Security Analysis and Design".

Glynn Winskel, University of Cambridge


Tuomas Aura, Microsoft Research (Cambridge)
Iliano Cervesato, ITT Industries
Giorgio Delzanno, University of Genova
Javier Esparza, University of Stuttgart
Alexander Grusho, Moscow State University
Joshua Guttmann, MITRE
Chris Hankin, Imperial College (London)
Masami Hagiya, University of Tokyo
Nisse Husberg, Helsinki University of Technology
Igor Kotenko, St.Petersburg Institute for Informatics and Automation
Maciej Koutny, University of Newcastle
Peter Lory, University of Regensburg
Andrea Maggiolo-Schettini, University of Pisa
Victor Malyshkin, Russian Academy of Sciences
Jonathan Millen, SRI International
G. Michele Pinna, University of Siena
Edward Pogossian, National Academy of Sciences of Armenia
Peter Ryan, University of Newcastle
Valdimiro Sassone, University of Sussex
Glynn Winskel, University of Cambridge


Nadia Busi, University of Bologna (busi@cs.unibo.it)
Roberto Gorrieri, University of Bologna (gorrieri@cs.unibo.it)
Fabio Martinelli, IIT-CNR (fabio.martinelli@iit.cnr.it)


Paper Submission:    02 April 2004
Author Notification: 14 May 2004
Final version due:   04 June 2004
Workshop:            26 June 2004


Papers should be up to 15 pages, with 11pt or larger font and reasonable
margins and line spacing. Author's full name, address, and e-mail must
appear in the cover page. More detailed instructions will follow.


Formal post-proceedings will be published as an ENTCS volume.
Informal workshop proceedings with the accepted papers will be
distributed at the workshop as a report of the Institute of Informatics
and Telematics (IIT) of the Italian National Research Council (CNR).
Also a few of the best papers might be invited for possible publication
on the journal Theoretical Computer Science (TCS).