PROGRAMME COMMITTEE
Farhad
Arbab (CWI, The Netherlands)
Iliano
Cervesato (ITT Industries, USA)
Rocco
De Nicola (Università di Firenza, Italy)
Joshua
Guttman (MITRE Corporation, USA)
Chris
Hankin (Imperial College, UK)
Ronaldo
Menezes (Florida Tech, USA)
Andrei
Sabelfeld (Chalmers University, Sweden)
Jan
Vitek (Purdue University, USA)
INVITED SPEAKERS
Roberto Gorrieri
(Università di Bologna, Italy)
Chris Hankin
(Imperial College, UK)
WORKSHOP
PROGRAM
Below you
can see the program of the workshop
WORKSHOP CO-CHAIRS
Riccardo Focardi
Dip. di Informatica - Universitΰ Ca' Foscari di Venezia
Gianluigi Zavattaro
Dip. di Scienze dell'Informazione - Università di Bologna
SUBMISSION GUIDELINES
The workshop proceedings
will be published in the ENTCS series (Electronic
Notes in Theoretical Computer Science).
As done for the previous SecCo'03 workshop, we intend to publish
a journal special issue inviting full versions of papers selected
among those presented at the workshop.
IMPORTANT DATES
Abstract
submission: June 1, 2004
Paper
submission: June 6, 2004
Notification: July 12, 2004
Pre-Final version: July 22, 2004
Meeting date: August
30, 2004
Final version: September 26, 2004
UNDER THE AUSPICES OF
IFIP Working
Group 1.7
|
|
SCOPE AND TOPICS
The 2nd International
Workshop on Security Issues in Coordination Models, Languages,
and Systems follows the success of SecCo'03
(held in conjunction with ICALP'03).
New networking
technologies require the definition of models and languages
adequate for the design and management of new classes of applications.
Innovations are moving in two directions: on the one hand,
the Internet which supports wide area applications, on the
other hand, smaller networks of mobile and portable devices
which support applications based on a dynamically reconfigurable
communication structure. In both cases, the challenge is to
develop applications while at design time there is no knowledge
of the availability and/or location of the involved entities.
Coordination models, languages
and middlewares, which advocate a distinct separation between
the internal behaviour of the entities and their interaction,
represent a promising approach. However, due to the openness
of these systems, new critical aspects come into play, such
as the need to deal with malicious components or with a hostile
environment. Current research on network security issues (e.g.
secrecy, authentication, etc.) usually focuses on opening
cryptographic point-to-point tunnels. Therefore, the proposed
solutions in this area are not always exploitable to support
the end-to-end secure interaction between entities whose availability
or location is not known beforehand.
Topics of interest include,
but are not limited to:
authentication integrity privacy
confidentiality access control denial of service
service availability safety aspects fault
tolerance |
in |
coordination models
web service technology
mobile ad-hoc networks
agent-based infrastructures
peer-to-peer systems
global computing
context-aware computing
ubiquitous/pervasive comp.
component-based systems
|
|