2nd International Workshop on
Security Issues in Coordination
Models, Languages, and Systems
August 30, 2004, London, United Kingdom
Affiliated to CONCUR 2004, Aug.30-Sept.4, 2004
Call for papers in PS format


PROGRAMME COMMITTEE
Farhad Arbab (CWI, The Netherlands)
Iliano Cervesato (ITT Industries, USA)
Rocco De Nicola (Università di Firenza, Italy)
Joshua Guttman (MITRE Corporation, USA)
Chris Hankin (Imperial College, UK)
Ronaldo Menezes (Florida Tech, USA)
Andrei Sabelfeld (Chalmers University, Sweden)
Jan Vitek (Purdue University, USA)

INVITED SPEAKERS
Roberto Gorrieri (Università di Bologna, Italy)
Chris Hankin (Imperial College, UK)

WORKSHOP PROGRAM
Below you can see the program of the workshop

WORKSHOP CO-CHAIRS
Riccardo Focardi
Dip. di Informatica - Universitΰ Ca' Foscari di Venezia
Gianluigi Zavattaro
Dip. di Scienze dell'Informazione - Università di Bologna

SUBMISSION GUIDELINES
The workshop proceedings will be published in the ENTCS series (Electronic Notes in Theoretical Computer Science).
As done for the previous SecCo'03 workshop, we intend to publish a journal special issue inviting full versions of papers selected among those presented at the workshop.

IMPORTANT DATES
Abstract submission: June 1, 2004
Paper submission: June 6, 2004
Notification: July 12, 2004
Pre-Final version: July 22, 2004
Meeting date:
August 30, 2004
Final version: September 26, 2004

UNDER THE AUSPICES OF
IFIP Working Group 1.7

 

SCOPE AND TOPICS
The 2nd International Workshop on Security Issues in Coordination Models, Languages, and Systems follows the success of SecCo'03 (held in conjunction with ICALP'03).
New networking technologies require the definition of models and languages adequate for the design and management of new classes of applications. Innovations are moving in two directions: on the one hand, the Internet which supports wide area applications, on the other hand, smaller networks of mobile and portable devices which support applications based on a dynamically reconfigurable communication structure. In both cases, the challenge is to develop applications while at design time there is no knowledge of the availability and/or location of the involved entities.
Coordination models, languages and middlewares, which advocate a distinct separation between the internal behaviour of the entities and their interaction, represent a promising approach. However, due to the openness of these systems, new critical aspects come into play, such as the need to deal with malicious components or with a hostile environment. Current research on network security issues (e.g. secrecy, authentication, etc.) usually focuses on opening cryptographic point-to-point tunnels. Therefore, the proposed solutions in this area are not always exploitable to support the end-to-end secure interaction between entities whose availability or location is not known beforehand.

Topics of interest include, but are not limited to:

• authentication
• integrity
• privacy
• confidentiality
• access control
• denial of service
• service availability
• safety aspects
• fault tolerance

in
• coordination models
• web service technology
• mobile ad-hoc networks
• agent-based infrastructures
• peer-to-peer systems
• global computing
• context-aware computing
• ubiquitous/pervasive comp.
• component-based systems

WORKSHOP PROGRAM

9:00 - 10:30
Joint with FOCLASA

Invited presentation:
"Continuous-Time Probabilistic KLAIM"
Chris Hankin,
Imperial College, UK

"Data Privacy in Tuple Space Based Mobile Agent Systems"
Lorenzo Bettini, Dip. Sistemi e Informatica, Univ. Firenze

10:30 - 11:00 Break

11:00 - 13:00

"An RBAC-like architecture for Organisation and Access Control in an Agent Coordination Infrastructure"
Andrea Omicini, DEIS Universita' degli Studi di Bologna
Alessandro Ricci, DEIS Universita' degli Studi di Bologna
Mirko Viroli, DEIS Universita' degli Studi di Bologna

Short Paper
"Flow-sensitive Leakage Analysis in Mobile Ambients"
Chiara Braghin, University of Venice
Agostino Cortesi, University of Venice

Short Paper
"
Tags for Multi-Protocol Authentication"
Matteo Maffei, Ca' Foscari University (Venice)

13:00 - 14:30 Lunch
14:30 -16:00
Joint with FOCLASA

Invited presentation:
"On the expressiveness of probabilistic and prioritized data-retrieval in Linda"
Roberto Gorrieri,
Università di Bologna, Italy

Foclasa paper:
"Prototype Platforms for Distributed Agreements"
Alberto Baragatti, Università di Pisa, Italy
Roberto Bruni, Università di Pisa, Italy
Hernán Melgratti, Università di Pisa, Italy
Ugo Montanari, Università di Pisa, Italy
Giorgio Spagnolo, Università di Pisa, Italy

16:00 - 16:30 Break
16:30 - 18:00

"Analysing the vulnerability of protocols to produce known-pair and chosen-text attacks"
Steve Kremer, University of Birmingham
Mark Ryan, University of Birmingham

"Team Automata for Security - A Survey -"
Maurice ter Beek, ISTI-CNR, Pisa, Italy
Gabriele Lenzini, Department of Computer Science, University of Twente, The Netherlands
Marinella Petrocchi, IIT-CNR, Pisa, Italy