Rewriting Techniques in a broad sense,
including for instance constraint solving techniques, logic programming
and automata techniques, have been recently applied with success in
various areas of security. Typical examples include security protocols,
security policies, web services, and access control. We seek
submissions of original research papers in these areas. They will be
evaluated according to the high standards of
Information and Computation and accepted papers will appear in a special issue of this journal.