WISP

2nd International Workshop on Security Issues
with Petri Nets and other Computational Models

Bologna, Italy,  26 June 2004


Call for Papers

For receiving the latest updates by e-mail on WISP 2004, subscribe to security@fosad.org (a mailing list for the scientific community interested in computer security).

Extended Program Registration through the ATPN04 web page

The 2nd International Workshop on  Security Issues with Petri Nets and other Computational Models (WISP2004) aims at promoting research about theoretical foundations of security analysis and design with formal methods and languages. WISP2004 starts from the positive experience with WISP2003, held in Eindhoven within the 24th International Conference on Application and Theory of Petri Nets (ICATPN'03). WISP2004 is co-located and will be held just after the 25th International Conference on Application and Theory of Petri Nets (ICATPN'04). Hence, original papers on the application of Petri Nets for security issues are particularly welcome. Also papers on security in other system models are sought as well.

This year, WISP has a special focus in security aspects related to coordination, composition and management of complex e-services. Indeed, the rapid growth of the Internet as a medium both for communication and computation fostered the development of commercial products for distributed computation, business process and workflow management. In such frameworks, the information is seamlessly exchanged, accessed and manipulated by many components and users with different goals, privileges and obligations. Confidentiality, integrity and availability of information need to be ensured during the whole lifetime of such e-services, even in presence of abnormal behavior. Monitoring and enforcing security may be considered much more challenging than in common communication protocols. Formal methods communities, and henceforth the Petri nets one, may successfully contribute also in this area to enrich the existing set of tools and techniques and thus to enhance user confidence on e-services.

Suggested submission topics include:
- security issues in orchestration/composition of e-services
- comparison and classification of security models
- formal definition and verification of the various aspects of security, trust and privacy
- information flow analysis
- security issues in probabilistic and real-time models
- mobile code security
- tools and techniques for the formal analysis of security properties
- applications to E/M-commerce
- case studies
Important dates
Abstract Submission: 09 April 2004Extended
Paper Submission: 14 April 2004Extended
Author Notification:  19 May 2004Extended
Final version due:  04 June 2004 
Workshop:  26 June 2004 

WISP2004 is a one-day workshop sponsored by the IFIP WG 1.7 on "Theoretical Foundations of Security Analysis and Design".

GRANT

INTAS funds are available for supporting (including registration fees for WISP and ICATPN'04, accommodation, travel) some scholars and researchers from NIS/INTAS countries. Priority will be given to authors of accepted papers, but also others may apply.

INVITED SPEAKERS:


PROGRAM COMMITTEE:


ORGANIZERs


SUBMISSION INSTRUCTIONS

Papers should be up to 15 pages, with 11pt or larger font and reasonable margins and line spacing. Author's full name, address, and e-mail must appear in the cover page. Simultaneous submission to a journal or conference/workshop with formal proceedings is not allowed. Please follow this link for paper submission. Alternatively, you cand send an e-mail with the paper (ps/pdf format) as attachement; in the body you should specify title, authors, abstract and keywords of the submission.


PROCEEDINGS

Formal post-proceedings will be published as an Electronic Notes in Theoretical Computer Science (ENTCS) volume. Informal workshop proceedings with the accepted papers will be distributed at the workshop as a report of the Institute of Informatics and Telematics (IIT) of the Italian National Research Council (CNR). Also a few of the best papers might be invited for possible publication in the journal Theoretical Computer Science (TCS).