Workshop on Security and Rewriting Techniques (SecReT 2009)
July 10-11, 2009. Port Jefferson, New York, USA
AIST > RCIS > SecReT 2009

SecReT 2009

Special issue of the Journal of Automated Reasoning on Security and Rewriting

The call for papers

Workshop on Security and Rewriting Techniques
July 10-11, 2009. Port Jefferson, New York, USA

Collocated with the 22nd IEEE Computer Security Foundations Symposium

Scientific Program

July 10

2:00-3:30 Welcome and Invited Talk by Jose Meseguer:
Security and Rewriting: A perfect match ?

3:30-4:00 Break

4:00 - 5:30 Paper Session I : Protocol Analysis and Access Control

July 11

9:00-10:30: Paper Session II : Protocol Analysis Techniques


10:30-11:00 Break

11:00-12:00 Business Meeting -- Open to all

Aims and Scope

We need to increase our confidence in security related applications. Formal verification is one of the most important methods of achieving this goal, and term rewriting has already played an important part. In particular, since the beginning of formal verification of security protocols, term rewriting has played a central role, both as a computation model and as a deduction strategy. Because of this, we believe that it can play an important role in solving other security-related formal verification problems as well. That is why it is important to bring together experts in term rewriting, constraint solving, equational reasoning on the one side and experts in security on the other side. This is precisely the aim of this workshop.

A possible (non exhaustive) list of topics include application of rewriting or constraint solving to authentication, encryption, access control and authorization, protocol verification, specification and analysis of policies, intrusion detection, integrity of information, control of information leakage, control of distributed and mobile code, etc.

Invited Speakers

Jose Meseguer (Univ. Illinois, USA)

Program Committee

Previous editions of the SecReT workshop

The homepage of the Security and Rewriting Techniques workshop