!                                                                         !
!			         FCS 2011                                 !
!                Workshop on Foundations of Computer Security             !
!                         Toronto, Ontario, Canada                        !
!                              June 20, 2011                              !
!                 http://www.di.ens.fr/~blanchet/fcs11/                   !
!                                                                         !
!                        Affiliated with LICS 2011                        !
!                                                                         !

Important dates

Abstracts due:		    March 29, 2011
Papers due: 		    April 3, 2011
Notification of acceptance: April 29, 2011
Final papers: 		    May 23, 2011

Background, aim and scope

Computer security is an established field of computer science of both
theoretical and practical significance. In recent years, there has
been increasing interest in logic-based foundations for various
methods in computer security, including the formal specification,
analysis and design of security protocols and their applications, the
formal definition of various aspects of security such as access
control mechanisms, mobile code security and denial-of-service
attacks, and the modeling of information flow and its application to
confidentiality policies, system composition, and covert channel

The aim of the workshop FCS'11 is to provide a forum for continued
activity in different areas of computer security, bringing computer
security researchers in closer contact with the LICS community and
giving LICS attendees an opportunity to talk to experts in computer
security, on the one hand, and contribute to bridging the gap between
logical methods and computer security foundations, on the other.

We are interested both in new results in theories of computer security
and also in more exploratory presentations that examine open questions
and raise fundamental concerns about existing theories, as well as in
new results on developing and applying automated reasoning techniques
and tools for the formal specification and analysis of security
protocols. We thus solicit submissions of papers both on mature work
and on work in progress.

Possible topics include, but are not limited to: 

Automated reasoning techniques
Composition issues
Formal specification
Foundations of verification
Information flow analysis
Language-based security
Logic-based design
Program transformation
Security models
Static analysis
Statistical methods
Trust management 	


Access control and resource usage control
Availability and denial of service
Covert channels
Integrity and privacy
Intrusion detection
Malicious code
Mobile code
Mutual distrust
Security policies
Security protocols


All submissions will be peer-reviewed. Authors of accepted papers must
guarantee that their paper will be presented at the workshop.

Submissions should be at most 15 pages (a4paper, 11pt), including
references in the Springer LNCS style available at the URL

The cover page should include title, names of authors, co-ordinates of
the corresponding author, an abstract, and a list of keywords.
Submissions that are clearly too long may be rejected immediately.
Additional material intended for the referees but not for publication
in the final version - for example details of proofs - may be placed
in a clearly marked appendix that is not included in the page limit.

Authors are invited to submit their papers electronically, as portable
document format (pdf) or postscript (ps); please, do not send files
formatted for word processing packages (e.g., Microsoft Word or
WordPerfect files). The only mechanism for paper submissions is 
via the dedicated EasyChair submission web page:


Please follow the instructions given there. 


Informal proceedings will be made available in electronic format and
they will be distributed to all participants of the workshop.

Program committee

  * Bruno Blanchet (INRIA, Ecole Normale Supérieure, CNRS, France; co-chair)
  * Michele Boreale (Università di Firenze, Italy)
  * Adam Chlipala (Harvard University, USA)
  * Véronique Cortier (LORIA INRIA-Lorraine, France)
  * Andrew D. Gordon (Microsoft Research Cambridge, UK)
  * Matthew Hennessy (Trinity College Dublin, Ireland)
  * Alan Jeffrey (Bell Labs, USA; co-chair)
  * Matteo Maffei (Saarland University, Germany)
  * Benjamin Pierce (University of Pennsylvania, USA)
  * Pierangela Samarati (Università degli Studi di Milano, Italy)
  * David Sands (Chalmers University of Technology, Sweden)
  * Geoffrey Smith (Florida International University, USA)
  * Bogdan Warinschi (University of Bristol, UK)