Call For Papers

LICS'03 Satellite Workshop on
Foundations of Computer Security - FCS'03
June 26-27, 2003
Ottawa, Canada

Extended submission deadline: March 30, 2003

Computer security is an established field of Computer Science of both theoretical and practical significance. In recent years, there has been increasing interest in logic-based foundations for various methods in computer security, including the formal specification, analysis and design of cryptographic protocols and their applications, the formal definition of various aspects of security such as access control mechanisms, mobile code security and denial-of-service attacks, and the modeling of information flow and its application to confidentiality policies, system composition, and covert channel analysis.

The aim of this workshop is to provide a forum for continued activity in this area, to bring computer security researchers in contact with the LICS'03 community, and to give LICS attendees an opportunity to talk to experts in computer security.


We are interested both in new results in theories of computer security and also in more exploratory presentations that examine open questions and raise fundamental concerns about existing theories. Possible topics include, but are not limited to:
Formal specification
Foundations of verification
Logic-based design
Information flow analysis
Security models
Language-based security
Static analysis
Composition issues
Statistical methods
for cryptographic protocols and applications
confidentiality and authentication
integrity and privacy
availability and denial of service
security policies
covert channels
mobile code
intrusion detection
malicious code confinement

Submission Instructions

Authors are invited to submit an extended abstract explaining recent research results or work in progress. Papers shall not exceed 10 pages, inclusive of bibliography and appendices. They should be formatted for A4 or US letter paper with reasonable margins and fonts. The first page should include the title, the names and addresses of the authors, an abstract and a list of keywords. Papers may be submitted electronically either through this web form or as an email attachment to the . All accounted submissions will be confirmed by a personal email from the program chair. Accepted formats are limited to portable postscript and PDF. Do not send files formatted for word processing packages (e.g., Microsoft Word or WordPerfect files). Simultaneous submissions to a journal or another conference are accepted.

The proceedings will be made available in electronic format and they will be distributed to all participants of the workshop. The authors of the best papers will be invited to submit an extended revision for inclusion in a special issue of a journal.

Important Dates

EXTENDED Submission deadline: March 30, 2003
Notification of acceptance: May 7, 2003
Final papers: May 30, 2003
Workshop: June 26-27, 2003

Program Committee

    Security Protocols, modeling, verification, access control, middleware security, certification
    Logical foundations of computer security, specification languages for security protocols, computational logic
    Cryptographic protocols, semantics, automated deduction, decision results, rewriting, constraints
    Information technology and the law, information security, mobile code
    Type-based security, crypto protocols, program logics
    Cryptographic protocols and formal methods, computational cryptography
    Protocol verification, logics for access control, formal models for Web services security, security requirement engineering
    Specification and verification of cryptographic protocols, denial of service
    Language-based security, probabilistic polynomial-time protocol analysis, java bytecode
    Language-based security, concurrent programming, static analysis, mobile code, covert channels
    security policies and models, authorizations, access control, data protection, privacy
    Formal specification, foundations of verification, logic-based design, language-based security, composition issues, statistical methods
    Analysis of cryptographic protocols, symbolic and probabilistic methods, privacy, anonymity, digital rights management

(Move the mouse over the Yes, like that! icon to see the interests of each member. You can also click here.)

Additional Information

Information about registration, travel and venue can be found at the LICS'03 web page. You may also want to consult the web page for the previous edition of FCS.

For further information contact:
Program Chair
Iliano Cervesato
ITT Industries, Inc. - AES Division
2560 Huntington Avenue
Alexandria, VA 22303-1410 - USA