Special issue of Information and Computation

on

Security and Rewriting Techniques


Call for Papers

Scope:


Rewriting Techniques in a broad sense, including for instance constraint solving techniques, logic programming and automata techniques, have been recently applied with success in various areas of security. Typical examples include security protocols, security policies, web services, and access control.  We seek submissions of original research papers in these areas. They will be evaluated according to the high standards of Information and Computation and accepted papers will appear in a special issue of this journal.

Submissions:


Submissions, in pdf format, must be sent to the two guest editors by E-mail, no later than

February 18, 2011 February 25, 2011 (extended)

We encourage the use of Elsevier's elsarticle.cls latex macro package, that can be retrieved from

http://www.elsevier.com/wps/find/authorsview.authors/elsarticle

Editors:

Steve Kremer
            kremer@lsv.ens-cachan.fr
Paliath Narendran     dran@cs.albany.edu

Please send any further inquiry to any of the two above editors.