|LinksVenue SecReT series||
5th International Workshop on Security and Rewriting Techniques
Accepted papers (new)
Aims and Scope
We need to increase our confidence in security related applications. Formal verification is one of the most important methods of achieving this goal, and term rewriting has already played an important part. In particular, since the beginning of formal verification of security protocols, term rewriting has played a central role, both as a computation model and as a deduction strategy. Because of this, we believe that it can play an important role in solving other security-related formal verification problems as well. That is why it is important to bring together experts in term rewriting, constraint solving, equational reasoning on the one side and experts in security on the other side. This is precisely the aim of this workshop.
A possible (non exhaustive) list of topics include application of rewriting or constraint solving to authentication, encryption, access control and authorization, protocol verification, specification and analysis of policies, intrusion detection, integrity of information, control of information leakage, control of distributed and mobile code, etc.
The workshop will have no formal proceedings. We therefore encourage submission of ongoing work as well as recently published work. Submissions should be 1 page abstracts summarizing the work the authors would like to present.
Abstracts should be submitted as ascii text files (less than 600 words) or as 1 page PDF files prepared using the easychair LaTeX style files (available here).
Last modified: Friday May 21 05:28:47 EDT 2010