FCS 2002

Foundations of Computer Security
Copenhagen, Denmark, July 25-26, 2002
Affiliated with LICS 2002

Future link: FCS'03 is at http://theory.stanford.edu/~iliano/fcs03/www/.

Computer security is an established field of Computer Science of both theoretical and practical significance. In recent years, there has been increasing interest in logic-based foundations for various methods in computer security, including the formal specification, analysis and design of cryptographic protocols and their applications, the formal definition of various aspects of security such as access control mechanisms, mobile code security and denial-of-service attacks, and the modeling of information flow and its application to confidentiality policies, system composition, and covert channel analysis.

The aim of this workshop is to provide a forum for continued activity in this area, to bring computer security researchers in contact with the FLoC community, and to give FLoC attendees an opportunity to talk to experts in computer security.

Given the affinity of themes, FCS is synchronized with the FLoC'02 Verification Workshop (VERIFY). Sessions with a likely overlap in audience will be held jointly. Moreover, authors who think that their paper is of interest for both FCS and VERIFY can indicate that it should be considered a joint submission, and it will be reviewed by members of both program committees.


We are interested both in new results in theories of computer security and also in more exploratory presentations that examine open questions and raise fundamental concerns about existing theories. Possible topics include, but are not limited to:
Formal specification
Foundations of verification
Logic-based design
Information flow analysis
Security models
Language-based security
Static analysis
Composition issues
Statistical methods
for cryptographic protocols and applications
confidentiality and authentication
integrity and privacy
availability and denial of service
security policies
covert channels
mobile code
intrusion detection
malicious code confinement

Submission Instructions

Authors are invited to submit an extended abstract explaining recent research results or work in progress. Papers shall not exceed 10 pages, inclusive of bibliography and appendices. They should be formatted for A4 or US letter paper with reasonable margins and fonts. The first page should include the title, the names and addresses of the authors, an abstract, a list of keywords, and an indication of whether this is a joint submission to FCS and VERIFY. Papers may be submitted electronically either through this web form or as an email attachment to the . All accounted submissions will be confirmed by a personal email from the program chair. Accepted formats are limited to portable postscript and PDF. Do not send files formatted for word processing packages (e.g., Microsoft Word or WordPerfect files). Simultaneous submissions to a journal or another conference are accepted.

The proceedings will be made available in electronic format. The accepted papers of FCS and VERIFY will be collected as a joint DIKU technical report that will be distributed to all participants of the workshop.

More information

Slides for all presentations are available at http://www.cs.stanford.edu/~iliano/conferences/fcs02/program.html.

Invited speakers


Program Committee

Organizing Committee