<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.0 Transitional//EN">
<HTML><HEAD>
<META http-equiv=Content-Type content="text/html; charset=iso-8859-1">
<META content="MSHTML 6.00.2900.2627" name=GENERATOR>
<STYLE></STYLE>
</HEAD>
<BODY bgColor=#ffffff>
<DIV><FONT face=Arial size=2><FONT face="Times New Roman" size=3>(apologizes for
multiple
copies)<BR>===================================================================================<BR>
1st International Workshop
on<BR><BR>
Applications of<BR> Constraint
Satisfaction and
Programming<BR>
to<BR>
Computer
Security<BR>
(CPSec)<BR>
October 1st,
2005<BR>
Barcelona,
Spain<BR>
Held in conjunction
with<BR>
11th International Conference on<BR>Principles and Practice of Constraint
Programming, CP2005<BR><BR> </FONT><A href=""><FONT face="Times New Roman"
size=3>http://www.sci.unich.it/~bista/organizing/cpsec/</FONT></A><BR><BR><FONT
face="Times New Roman"
size=3>====================================================================================<BR>
Call for
Paper<BR>====================================================================================<BR><BR><BR>Constraint
Satisfaction and Programming is emerging as an effective <BR>practical approach
for solving large complex problems. It offers a <BR>significant body
of<BR>successful techniques for verifying system properties. Recently,
researchers<BR>have begun using advances in constraint programming and solving
to solve <BR>security problems, with success. This workshop seeks to act as a
catalyst <BR>for this emerging area by exploring the challenges and the
potential that <BR>these techniques may offer when applied to security
problems.<BR><BR>The use of Constraint Satisfaction and Programming to address
security <BR>problems is recent, and it has already produced a number of novel
solutions <BR>and insights. For example, constraints have been successfully used
in the <BR>the analysis of security protocols, the development of access control
models <BR>and mechanisms, firewall configuration and secure system
configuration in <BR>general.<BR><BR>Workshop topics include (but are not
limited to):<BR><BR>* security models<BR>* information flow<BR>* trust
management<BR>* database security<BR>* data and system integrity<BR>* security
protocols<BR>* security configuration<BR>* access control<BR>* secure
applications<BR>* security trade-offs<BR><BR><BR><BR>Submissions<BR><BR>The
workshop aim is to provide a forum where researchers currently working <BR>in
the area of security and constraints can discuss their most recent ideas
<BR>and<BR>developments and think together about the most promising new
directions.<BR>Therefore we encourage the presentation of work in progress or on
<BR>specialized aspects of the area. Papers that bridge the gap between theory
<BR>and practice are especially welcome.<BR><BR>Prospective attendees can submit
a paper, which can be up to 15 pages in <BR>length.<BR>We encourage authors to
submit papers electronically in postscript or pdf <BR>format.<BR>Papers should
be formatted using the Lecture Notes in Computer Science <BR>(LNCS)
style.<BR>Please send your submissions by email to </FONT><A href=""><FONT
face="Times New Roman" size=3>stefano.bistarelli@iit.cnr.it</FONT></A><FONT
face="Times New Roman" size=3> using <BR>the subject line "cpsec-2005 Workshop
Submission".<BR><BR><BR><BR>Important Dates<BR>The proposed schedule of
important dates for the workshop is as follows:<BR><BR>Paper Submission deadline
June 26th<BR>Notification of acceptance July 24th<BR>Camera-ready version
deadline August 16th<BR>Workshop Date October 1st<BR><BR><BR>Workshop
Organizers:<BR><BR> Giampaolo Bella<BR> Dipartimento di
Matematica e Informatica<BR> Universit`a di Catania,
Italy<BR> Email: </FONT><A href=""><FONT face="Times New Roman"
size=3>giamp@dmi.unict.it</FONT></A><BR><FONT face="Times New Roman"
size=3> Web: </FONT><A href=""><FONT face="Times New Roman"
size=3>http://www.dmi.unict.it/~giamp/</FONT></A><BR><BR><FONT
face="Times New Roman" size=3>and<BR><BR> Stefano Bistarelli
(Primary Contact)<BR> Dipartimento di Scienze<BR>
Università degli studi "G. D'Annunzio" di Chieti-Pescara, Italy<BR>
Email: </FONT><A href=""><FONT face="Times New Roman"
size=3>bista@sci.unich.it</FONT></A><BR><FONT face="Times New Roman"
size=3> Web: </FONT><A href=""><FONT face="Times New Roman"
size=3>http://www.sci.unich.it/~bista/</FONT></A><BR><FONT
face="Times New Roman" size=3> and<BR> Istituto di
Informatica e Telematica<BR> C.N.R. Pisa, Italy<BR>
Email: </FONT><A href=""><FONT face="Times New Roman"
size=3>stefano.bistarelli@iit.cnr.it</FONT></A><BR><BR><FONT
face="Times New Roman" size=3>and<BR><BR> Simon N.
Foley<BR> Department of Computer Science<BR> University
College Cork, Ireland<BR> Email: </FONT><A href=""><FONT
face="Times New Roman" size=3>s.foley@cs.ucc.ie</FONT></A><BR><FONT
face="Times New Roman" size=3> Web: </FONT><A href=""><FONT
face="Times New Roman"
size=3>http://www.cs.ucc.ie/~simon/</FONT></A><BR><BR><FONT
face="Times New Roman" size=3>and<BR><BR> Barry
O’Sullivan<BR> Cork Constraint Computation Centre<BR>
University College Cork, Ireland<BR> and<BR> Department
of Computer Science<BR> University College Cork,
Ireland<BR> Email: </FONT><A href=""><FONT face="Times New Roman"
size=3>b.osullivan@cs.ucc.ie</FONT></A><BR><FONT face="Times New Roman"
size=3> Web: </FONT><A href=""><FONT face="Times New Roman"
size=3>http://www.cs.ucc.ie/~osullb/</FONT></A><BR><BR><BR><BR><BR><FONT
face="Times New Roman" size=3>Program Committee:<BR><BR>Giampaolo Bella --
Dipartimento di Matematica e Informatica, Universita' di <BR>Catania,
Italy<BR>Stefano Bistarelli -- Universita' degli Studi “G. D’annunzio”, Pescara,
<BR>Italy and IIT-CNR, Pisa, Italy<BR>Yannick Chevalier -- Institut de Recherche
en Informatique de Toulouse <BR>(IRIT), France<BR>Giorgio Delzanno --
Dipartimento Informatica e Scienze dell'Informazione, <BR>Università di Genova,
Italy<BR>Alessandra Di Pierro -- Dipartimento di Informatica, University of
Pisa, <BR>Italy<BR>Fabio Fioravanti -- Universita' degli Studi “G. D’annunzio”,
Pescara, Italy<BR>Simon Foley -- Department of Computer Science University
College Cork, <BR>Ireland<BR>John Herbert -- Department of Computer Science
University College Cork, <BR>Ireland<BR>Fabio Martinelli -- Istituto di
Informatica e Telematica, CNR, Pisa, Italy<BR>Barry O’Sullivan -- Cork
Constraint Computation Centre, University College <BR>Cork, Ireland<BR>Michael
Rusinowitch -- INRIA Lorraine, Villers les Nancy, Cedex, France<BR>Justin
Pearson -- Department of information technology, Uppsala University,
<BR>Sweden<BR>Vitaly Shmatikov -- Department of Computer Sciences, The
University of Texas <BR>at Austin, USA<BR>Fred Spiessens -- U.C.L.
Louvain-la-Neuve, Belgium<BR>Garret Swart -- I.B.M. Research, USA<BR>Peter Van
Roy -- Department of Computing Science and Engineering, Catholic <BR>University
of Louvain, Belgium<BR>Luca Vigano -- ETH, Zurich, Switzerland<BR>Duminda
Wijesekera -- ISE, George Mason University, USA<BR>Herbert Wiklicky --
Department of Computing, Imperial College London, UK
</FONT><BR></FONT></DIV></BODY></HTML>