Program | Registration through the ATPN04 web page |
The 2nd International Workshop on Security Issues with Petri Nets and other Computational Models (WISP2004) aims at promoting research about theoretical foundations of security analysis and design with formal methods and languages. WISP2004 starts from the positive experience with WISP2003, held in Eindhoven within the 24th International Conference on Application and Theory of Petri Nets (ICATPN'03). WISP2004 is co-located and will be held just after the 25th International Conference on Application and Theory of Petri Nets (ICATPN'04). Hence, original papers on the application of Petri Nets for security issues are particularly welcome. Also papers on security in other system models are sought as well.
This year, WISP has a special focus in security aspects related
to coordination, composition and management of complex
e-services. Indeed, the rapid growth of the Internet as a
medium both for communication and computation fostered the
development of commercial products for distributed computation,
business process and workflow management. In such frameworks,
the information is seamlessly exchanged, accessed and manipulated
by many components and users with different goals, privileges
and obligations. Confidentiality, integrity and availability of
information need to be ensured during the whole lifetime
of such e-services, even in presence of abnormal behavior.
Monitoring and enforcing security may be considered much more
challenging than in common communication protocols. Formal
methods communities, and henceforth the Petri nets one, may
successfully contribute also in this area to enrich the existing
set of tools and techniques and thus to enhance user confidence
on e-services.
|
|
WISP2004 is a one-day workshop sponsored by the IFIP WG 1.7 on "Theoretical Foundations of Security Analysis and Design".
GRANT
INTAS funds are available for supporting (including registration fees for WISP and ICATPN'04, accommodation, travel) some scholars and researchers from NIS/INTAS countries. Priority will be given to authors of accepted papers, but also others may apply.
INVITED SPEAKERS:
PROGRAM COMMITTEE:
ORGANIZERs
SUBMISSION INSTRUCTIONS
Papers should be up to 15 pages, with 11pt or larger font and reasonable
margins and line spacing. Author's full name, address, and e-mail must
appear in the cover page. Simultaneous submission to a journal or conference/workshop with formal proceedings is not allowed.
Please follow this link for paper submission. Alternatively, you cand
send an e-mail with the paper (ps/pdf format) as attachement; in the body you should specify
title, authors, abstract and keywords of the submission.
PROCEEDINGS
Formal post-proceedings will be published as an Electronic Notes in Theoretical Computer Science (ENTCS) volume.
Informal workshop proceedings with the accepted papers will be
distributed at the workshop as a report of the Institute of Informatics
and Telematics (IIT) of the Italian National Research Council (CNR).
Also a few of the best papers might be invited for possible publication
in the journal Theoretical Computer Science (TCS).