Arbab (CWI, The Netherlands)
Cervesato (ITT Industries, USA)
De Nicola (Università di Firenza, Italy)
Guttman (MITRE Corporation, USA)
Hankin (Imperial College, UK)
Menezes (Florida Tech, USA)
Sabelfeld (Chalmers University, Sweden)
Vitek (Purdue University, USA)
(Università di Bologna, Italy)
(Imperial College, UK)
can see the program of the workshop
Dip. di Informatica - Universitΰ Ca' Foscari di Venezia
Dip. di Scienze dell'Informazione - Università di Bologna
The workshop proceedings
will be published in the ENTCS series (Electronic
Notes in Theoretical Computer Science).
As done for the previous SecCo'03 workshop, we intend to publish
a journal special issue inviting full versions of papers selected
among those presented at the workshop.
submission: June 1, 2004
submission: June 6, 2004
Notification: July 12, 2004
Pre-Final version: July 22, 2004
Meeting date: August
Final version: September 26, 2004
UNDER THE AUSPICES OF
SCOPE AND TOPICS
The 2nd International
Workshop on Security Issues in Coordination Models, Languages,
and Systems follows the success of SecCo'03
(held in conjunction with ICALP'03).
technologies require the definition of models and languages
adequate for the design and management of new classes of applications.
Innovations are moving in two directions: on the one hand,
the Internet which supports wide area applications, on the
other hand, smaller networks of mobile and portable devices
which support applications based on a dynamically reconfigurable
communication structure. In both cases, the challenge is to
develop applications while at design time there is no knowledge
of the availability and/or location of the involved entities.
Coordination models, languages
and middlewares, which advocate a distinct separation between
the internal behaviour of the entities and their interaction,
represent a promising approach. However, due to the openness
of these systems, new critical aspects come into play, such
as the need to deal with malicious components or with a hostile
environment. Current research on network security issues (e.g.
secrecy, authentication, etc.) usually focuses on opening
cryptographic point-to-point tunnels. Therefore, the proposed
solutions in this area are not always exploitable to support
the end-to-end secure interaction between entities whose availability
or location is not known beforehand.
Topics of interest include,
but are not limited to:
denial of service
web service technology
mobile ad-hoc networks